Behavioral task
behavioral1
Sample
8fc6a92c7ca0e544111525b90dc5a28a0bd13c0836a997638b985a8a0d42c31e
Resource
ubuntu1804-amd64-en-20211208
ubuntu-18.04-amd64
0 signatures
150 seconds
General
-
Target
8fc6a92c7ca0e544111525b90dc5a28a0bd13c0836a997638b985a8a0d42c31e
-
Size
89KB
-
MD5
328f521ce1f38638860423a9046c544c
-
SHA1
bb6b265d7c52e21173f2c04fcb0bcc4c18e07c7d
-
SHA256
8fc6a92c7ca0e544111525b90dc5a28a0bd13c0836a997638b985a8a0d42c31e
-
SHA512
36f8b6150819f7116548ec4e7addb1ec128e388672b26fd8c2393b4ae0f0561529e870c42493b3c1949243e9b5d24bbe0e3979d1908a55e954b96473208f5ca7
-
SSDEEP
1536:uNhNQx0FIRbCGHw/YBlW/s/M/qZt60IQ4XhM8bIKiS2UgMatV/cR6eA7wZYc:D0FIRLHCE/M/q/60IFF0cgxD/cRRA7wb
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
resource yara_rule sample family_mirai -
Detected Gafgyt variant 1 IoCs
resource yara_rule sample family_gafgyt -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Gafgyt family
-
Mirai family
-
Mirai_x86corona family
Files
-
8fc6a92c7ca0e544111525b90dc5a28a0bd13c0836a997638b985a8a0d42c31e.elf linux x86