Behavioral task
behavioral1
Sample
56e85a14073c26b6986acfaaa9c5240b04c6940abf30764b8215ee84c3951d65
Resource
ubuntu1804-amd64-en-20211208
ubuntu-18.04-amd64
0 signatures
150 seconds
General
-
Target
56e85a14073c26b6986acfaaa9c5240b04c6940abf30764b8215ee84c3951d65
-
Size
169KB
-
MD5
07e4ca743d8640e489055f937e99f004
-
SHA1
259c08223ca40f148f0d320e3db0a9151da0c041
-
SHA256
56e85a14073c26b6986acfaaa9c5240b04c6940abf30764b8215ee84c3951d65
-
SHA512
7903c016d650dd9de3063f9d91a003c4d3801d3500f92bed9115690f607885b7223efecae431e41a03de7b83958df54bddf67ffdae07d09fc507e26c868fea74
-
SSDEEP
3072:9YnhV9p3uOUnQ0ZyBmR7PL8RetJ8aIfhg8mYsOltGhKlxL8exuXiH90PfNatph1:AV9n+wof8RetJ8aIf7llcOQiH90PfNaP
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
resource yara_rule sample family_mirai -
Detected Gafgyt variant 1 IoCs
resource yara_rule sample family_gafgyt -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Gafgyt family
-
Mirai family
-
Mirai_x86corona family
Files
-
56e85a14073c26b6986acfaaa9c5240b04c6940abf30764b8215ee84c3951d65.elf linux x86