Behavioral task
behavioral1
Sample
8efe3ae35c02b91e4ea6a55b5902b3de0bfa3331e750a88375992504958ab412
Resource
ubuntu1804-amd64-en-20211208
ubuntu-18.04-amd64
2 signatures
150 seconds
General
-
Target
8efe3ae35c02b91e4ea6a55b5902b3de0bfa3331e750a88375992504958ab412
-
Size
106KB
-
MD5
60223738106f7accc114a9644394fa95
-
SHA1
d88f03e7ca61e77fe203d9a4b5f0dc8f36e05b4c
-
SHA256
8efe3ae35c02b91e4ea6a55b5902b3de0bfa3331e750a88375992504958ab412
-
SHA512
43b87d9697225ff275cd3e76b50df340aed8f27419ef5a57960befc414bc6f7e18b650bf28dcc1685f351a61c8a984c55a8ef6480bc3ad6237648760b4d10a61
-
SSDEEP
3072:99tgMufhwBtalCBYme8TohmqomcqqzdnjLT:99tKa/BYme8UhmqomcqqzdnjLT
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
resource yara_rule sample family_mirai -
Detected Gafgyt variant 1 IoCs
resource yara_rule sample family_gafgyt -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Gafgyt family
-
Mirai family
-
Mirai_x86corona family
Files
-
8efe3ae35c02b91e4ea6a55b5902b3de0bfa3331e750a88375992504958ab412.elf linux x86