Behavioral task
behavioral1
Sample
31ee294801b7a2ebb33b3b054ebf45f53d85479ba67eb1b46b621c6cf82704f7
Resource
ubuntu1804-amd64-en-20211208
ubuntu-18.04-amd64
2 signatures
150 seconds
General
-
Target
31ee294801b7a2ebb33b3b054ebf45f53d85479ba67eb1b46b621c6cf82704f7
-
Size
133KB
-
MD5
df5b10b695b8a1fc03c2f6ce7dfe8d22
-
SHA1
2238f343c603b4f8a2519d2a24029d105ff7b41f
-
SHA256
31ee294801b7a2ebb33b3b054ebf45f53d85479ba67eb1b46b621c6cf82704f7
-
SHA512
a6311a81249e1e9a0606a0c647575277230ba4f3caaceffefcababfb6f23700128c876a938aa05ae9dde8832461a150bd5481f20704ad0f56fc1b488e3454a64
-
SSDEEP
3072:3iztnQKV/UVAYmPUORYR6OZZAHhhMDf0V4gjQaa6GM:3it30AFvmlyhhMDf0V4gjQaa6GM
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
resource yara_rule sample family_mirai -
Detected Gafgyt variant 1 IoCs
resource yara_rule sample family_gafgyt -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Gafgyt family
-
Mirai family
-
Mirai_x86corona family
Files
-
31ee294801b7a2ebb33b3b054ebf45f53d85479ba67eb1b46b621c6cf82704f7.elf linux x86