Behavioral task
behavioral1
Sample
6b9bf7adfe50a9b88917e30915d79e917a5e0e8c7bed1556a40f73b2e92a9be3
Resource
ubuntu1804-amd64-en-20211208
ubuntu-18.04-amd64
0 signatures
150 seconds
General
-
Target
6b9bf7adfe50a9b88917e30915d79e917a5e0e8c7bed1556a40f73b2e92a9be3
-
Size
116KB
-
MD5
022e744c68cb443cd33a2c9278d899c9
-
SHA1
5e231b22652b755450258464591c6216a34f3815
-
SHA256
6b9bf7adfe50a9b88917e30915d79e917a5e0e8c7bed1556a40f73b2e92a9be3
-
SHA512
a5fb58c79df67e4e05c807071431d1f31edbed8f2d70e8e8975cb95112326debf5dfdbe67bf5300a2595311be31c1befc1e4b7f663d6d3b821e0efffd116cff4
-
SSDEEP
3072:KGR1eOtJ8AAWS8oJMetJ8au49QuTsSjTAeDvgXBtcZkG7gyqc:KoyxIoJMetJ8au4llf5gXBtcZn7gyqc
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
resource yara_rule sample family_mirai -
Detected Gafgyt variant 1 IoCs
resource yara_rule sample family_gafgyt -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Gafgyt family
-
Mirai family
-
Mirai_x86corona family
Files
-
6b9bf7adfe50a9b88917e30915d79e917a5e0e8c7bed1556a40f73b2e92a9be3.elf linux x86