Behavioral task
behavioral1
Sample
8f33fbb63086d973283c38bca6ac9f6947a2f72acb61a46ed282eca920780564
Resource
ubuntu1804-amd64-en-20211208
ubuntu-18.04-amd64
0 signatures
150 seconds
General
-
Target
8f33fbb63086d973283c38bca6ac9f6947a2f72acb61a46ed282eca920780564
-
Size
97KB
-
MD5
5cd86ed72bf092582b67ff9ec35334e0
-
SHA1
edeb3ff7348e5d9290ff423c3f510df33745ee51
-
SHA256
8f33fbb63086d973283c38bca6ac9f6947a2f72acb61a46ed282eca920780564
-
SHA512
1ad06931329399e3063d08c1c60f2ee09936b6667ba7b7df39e591a9740bbd02c98b028488975b1b7fe3583736d69164eb08b968a980008d79eded624ff6f207
-
SSDEEP
3072:dvzKKPQP39VjGWXF8T7pV7EGytVw5hNTdbFXnf0OzTyoQQub:dHQP39VjGWXZ9tVw5h99FXnf0OzTyoQ7
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
resource yara_rule sample family_mirai -
Detected Gafgyt variant 1 IoCs
resource yara_rule sample family_gafgyt -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Gafgyt family
-
Mirai family
-
Mirai_x86corona family
Files
-
8f33fbb63086d973283c38bca6ac9f6947a2f72acb61a46ed282eca920780564.elf linux x86