Behavioral task
behavioral1
Sample
7ed9300272482e265a5deb93dac9bcf9381b1edbe58ab1b40578e3c2b9874258
Resource
ubuntu1804-amd64-en-20211208
ubuntu-18.04-amd64
2 signatures
150 seconds
General
-
Target
7ed9300272482e265a5deb93dac9bcf9381b1edbe58ab1b40578e3c2b9874258
-
Size
123KB
-
MD5
08d2f73394472a2a059a6042fa939f98
-
SHA1
cc72f6ec8e6e01099d55bda2ab94496e39710f56
-
SHA256
7ed9300272482e265a5deb93dac9bcf9381b1edbe58ab1b40578e3c2b9874258
-
SHA512
8b892ad82b00ab8c7e1afe79db48b105f836c0e8230469a68ec81c1205a776de538df43032394e4a303a21635df1f42b5d5aad2e476da9bab743879e7f0e63d9
-
SSDEEP
3072:DrgI/UEdiUqvLIaoEAgBPoP5+kINGGjqAmqoYcqL/hnIT6:DrgI/8Nvc4VggNGKqAmqoYcqL/hnIT6
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
resource yara_rule sample family_mirai -
Detected Gafgyt variant 1 IoCs
resource yara_rule sample family_gafgyt -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Gafgyt family
-
Mirai family
-
Mirai_x86corona family
Files
-
7ed9300272482e265a5deb93dac9bcf9381b1edbe58ab1b40578e3c2b9874258.elf linux x86