Behavioral task
behavioral1
Sample
c33f15d2abbbfbc815d05063734148169de2c5f371114ad4a8419f53886df459
Resource
ubuntu1804-amd64-en-20211208
ubuntu-18.04-amd64
0 signatures
150 seconds
General
-
Target
c33f15d2abbbfbc815d05063734148169de2c5f371114ad4a8419f53886df459
-
Size
101KB
-
MD5
a967b2b3931cc4f6239b95926438997f
-
SHA1
45e0e4a967096966a87a81cebd5bca92d6a62bcb
-
SHA256
c33f15d2abbbfbc815d05063734148169de2c5f371114ad4a8419f53886df459
-
SHA512
bd781cb6f2544301835d718bebc4d4936c5835da19a1aa21adf0a81ef464478a8f40121c49a34691e2c971ac32a761769ddd1a7fe287cfa6eddb24e881eae99d
-
SSDEEP
3072:wW8FUmgujld6Mkxm6AJ+4fCHmmFVcqq0GnDZT:wJFv4Lm6AJ+4fCHmmFVcqq0GnDZT
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
resource yara_rule sample family_mirai -
Detected Gafgyt variant 1 IoCs
resource yara_rule sample family_gafgyt -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Gafgyt family
-
Mirai family
-
Mirai_x86corona family
Files
-
c33f15d2abbbfbc815d05063734148169de2c5f371114ad4a8419f53886df459.elf linux x86