Behavioral task
behavioral1
Sample
57e11abb63cb27756163b7a4eb39f1a5f30e4e21c86277efa53af3df48636b96
Resource
ubuntu1804-amd64-en-20211208
ubuntu-18.04-amd64
1 signatures
150 seconds
General
-
Target
57e11abb63cb27756163b7a4eb39f1a5f30e4e21c86277efa53af3df48636b96
-
Size
112KB
-
MD5
c5c86b472142cda05ec0b740f1d2e89d
-
SHA1
5f45f28ea916b19b444e2927619587ec1690d917
-
SHA256
57e11abb63cb27756163b7a4eb39f1a5f30e4e21c86277efa53af3df48636b96
-
SHA512
d388969a28b8660736caa94096b20434e883dfbff836fff39a258414f8ea04788ef61dbae978823a153ccce8a54bb1574363cfdee072e015df5ad4f0087c8529
-
SSDEEP
3072:LmA+U4tD8KPy2aE2MuUetJ8au49QuTszROHPMO2VS+Il1iUnnl:cpn9huUetJ8au4lY672VS+Il1iUnnl
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
resource yara_rule sample family_mirai -
Detected Gafgyt variant 1 IoCs
resource yara_rule sample family_gafgyt -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Gafgyt family
-
Mirai family
-
Mirai_x86corona family
Files
-
57e11abb63cb27756163b7a4eb39f1a5f30e4e21c86277efa53af3df48636b96.elf linux x86