Behavioral task
behavioral1
Sample
58353b43aa32b4b76675bb5320f4e584a0d4fc5e9f095f7593d39ef75af7810b
Resource
ubuntu1804-amd64-en-20211208
ubuntu-18.04-amd64
2 signatures
150 seconds
General
-
Target
58353b43aa32b4b76675bb5320f4e584a0d4fc5e9f095f7593d39ef75af7810b
-
Size
98KB
-
MD5
1459f8cc58d6b5c3ad95c0221f6c9c70
-
SHA1
7678dcd81d177eb328c89f380374fb61d8d9ebe2
-
SHA256
58353b43aa32b4b76675bb5320f4e584a0d4fc5e9f095f7593d39ef75af7810b
-
SHA512
22d76080b4063940c9223749d9ea11b0c5e54ec5825eed5b05c41ece712a5f08124f0a98618d37001177b620112392b186c8e84636087275a01740e8d7a1f1ef
-
SSDEEP
3072:he7EqeQUHfPyjRJ9rBFKqg6F1QmqoVcqq6GnQOT:heZyo5Kqg6PQmqoVcqq6GnQOT
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
resource yara_rule sample family_mirai -
Detected Gafgyt variant 1 IoCs
resource yara_rule sample family_gafgyt -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Gafgyt family
-
Mirai family
-
Mirai_x86corona family
Files
-
58353b43aa32b4b76675bb5320f4e584a0d4fc5e9f095f7593d39ef75af7810b.elf linux x86