Behavioral task
behavioral1
Sample
f6e8d9ce0086ea7f1793f0e6512322358439183977ded303a19f604443cb3361
Resource
ubuntu1804-amd64-en-20211208
ubuntu-18.04-amd64
0 signatures
150 seconds
General
-
Target
f6e8d9ce0086ea7f1793f0e6512322358439183977ded303a19f604443cb3361
-
Size
103KB
-
MD5
a5fcffb0919d4c4c16a059c89264213b
-
SHA1
4f874325ecc1f4ac0778f6c7155fd98900b926d7
-
SHA256
f6e8d9ce0086ea7f1793f0e6512322358439183977ded303a19f604443cb3361
-
SHA512
449c89c4f2e27d6c33ed51b20a9fda18e2fd546a79d1676848c4be8a12f7c7559c962288a19f4d9dbbb9f15654b799a6fe0262741e5b0c5791e38754eeeeb283
-
SSDEEP
3072:drrMiZYMk3LsGMJicW5OdhQj4tJ8aAWVMmiYVO8wYbMau:dTzJivkdk4tJ8aAnmiYVO8wYbMau
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
resource yara_rule sample family_mirai -
Detected Gafgyt variant 1 IoCs
resource yara_rule sample family_gafgyt -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Gafgyt family
-
Mirai family
-
Mirai_x86corona family
Files
-
f6e8d9ce0086ea7f1793f0e6512322358439183977ded303a19f604443cb3361.elf linux x86