Behavioral task
behavioral1
Sample
b20e97245868ea834780d15f414050f12a2a01c3b93bb20833ac38fc023ada45
Resource
ubuntu1804-amd64-en-20211208
ubuntu-18.04-amd64
0 signatures
150 seconds
General
-
Target
b20e97245868ea834780d15f414050f12a2a01c3b93bb20833ac38fc023ada45
-
Size
97KB
-
MD5
2e30856a66b85192aa020462c193c8d3
-
SHA1
c906e51a7070a64152a12f31ccdc4441fd3bd5e6
-
SHA256
b20e97245868ea834780d15f414050f12a2a01c3b93bb20833ac38fc023ada45
-
SHA512
9ac32c93fbc39ec42e11913b95e76223f096ee601162f45fcf40caf47ebee6c57d0795c1867965de84eeefcc947931210c48f86d3dd6b148f828c46bf7ea67f0
-
SSDEEP
3072:VK1z13U6HzHoXRtmTUhQogLEmmFVcqq0GnDZT:VK7DDeKlogLEmmFVcqq0GnDZT
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
resource yara_rule sample family_mirai -
Detected Gafgyt variant 1 IoCs
resource yara_rule sample family_gafgyt -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Gafgyt family
-
Mirai family
-
Mirai_x86corona family
Files
-
b20e97245868ea834780d15f414050f12a2a01c3b93bb20833ac38fc023ada45.elf linux x86