Behavioral task
behavioral1
Sample
b5b614c95e212bc60b63ba4738bbb2b05c5f80108c9525aab00f33c760d62887
Resource
ubuntu1804-amd64-en-20211208
ubuntu-18.04-amd64
2 signatures
150 seconds
General
-
Target
b5b614c95e212bc60b63ba4738bbb2b05c5f80108c9525aab00f33c760d62887
-
Size
120KB
-
MD5
1c031113bc05e5d5f33d56370a700603
-
SHA1
ce76e798b570cd2de11065fe77f48173aaa879b9
-
SHA256
b5b614c95e212bc60b63ba4738bbb2b05c5f80108c9525aab00f33c760d62887
-
SHA512
03b7a0f8fee1e3869ddd8f027b38c6e71fac06a20c117c249016ef08483b9185b8858f63a634ae62f1db2c3127856de8cf31fbc4c0daeac3bf91ba8a3fce5732
-
SSDEEP
3072:RWIIeP00LTSyYSX0CPiFYyD8aAmml8chTj3aKYuM:0A1d1yD8aAmml8chTj3aKYuM
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
resource yara_rule sample family_mirai -
Detected Gafgyt variant 1 IoCs
resource yara_rule sample family_gafgyt -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Gafgyt family
-
Mirai family
-
Mirai_x86corona family
Files
-
b5b614c95e212bc60b63ba4738bbb2b05c5f80108c9525aab00f33c760d62887.elf linux x86