Behavioral task
behavioral1
Sample
b2c1e3fc824b1f924a89154269dca7bd5848131a279f49a4d40f11328a5b30b0
Resource
ubuntu1804-amd64-en-20211208
ubuntu-18.04-amd64
2 signatures
150 seconds
General
-
Target
b2c1e3fc824b1f924a89154269dca7bd5848131a279f49a4d40f11328a5b30b0
-
Size
120KB
-
MD5
0a952341b69fb198c2d579f82b79ca4e
-
SHA1
8ea821a6103d1740dd297c0dfbc5ad621c36951e
-
SHA256
b2c1e3fc824b1f924a89154269dca7bd5848131a279f49a4d40f11328a5b30b0
-
SHA512
e50fd47cf605e9c3b914151e5ecea7ac0f25c33b07a894c3d473bf3ba4c64568ad8198935937667ca8b6516143adad29d1805231320dc5c1dc70f1b37312bb35
-
SSDEEP
3072:UdYFMLcP3qehtsTzpHVPy7JPGREYumqMVcqWl2njTm:UuFZP3MrPy7sumqMVcqWl2njTm
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
resource yara_rule sample family_mirai -
Detected Gafgyt variant 1 IoCs
resource yara_rule sample family_gafgyt -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Gafgyt family
-
Mirai family
-
Mirai_x86corona family
Files
-
b2c1e3fc824b1f924a89154269dca7bd5848131a279f49a4d40f11328a5b30b0.elf linux x86