Behavioral task
behavioral1
Sample
57e9204e666d147c563be3494ccce172adc2880d3f8353669ab25d69cd2103cb
Resource
ubuntu1804-amd64-en-20211208
ubuntu-18.04-amd64
2 signatures
150 seconds
General
-
Target
57e9204e666d147c563be3494ccce172adc2880d3f8353669ab25d69cd2103cb
-
Size
124KB
-
MD5
743acd28723eaa73a9358de859244000
-
SHA1
2a246f20b5f894d70aad4400cab14703f78327dd
-
SHA256
57e9204e666d147c563be3494ccce172adc2880d3f8353669ab25d69cd2103cb
-
SHA512
4a9e790f435cf74b9fe91a8813a79f878e77b750ae968c03ac5fe95723ddd5a536fb8fc4e7509d28157d61213ddaad85b6cfd971dc104cadd47a2a7b47f61042
-
SSDEEP
3072:EXY5gzI24XRFnDjmoRcQeFxfusim3ZOZhzD9oY4giAGaJpP:EXY5BDXR9Jc5Om3ZObzD9oY4giAGaJpP
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
resource yara_rule sample family_mirai -
Detected Gafgyt variant 1 IoCs
resource yara_rule sample family_gafgyt -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Gafgyt family
-
Mirai family
-
Mirai_x86corona family
Files
-
57e9204e666d147c563be3494ccce172adc2880d3f8353669ab25d69cd2103cb.elf linux x86