Behavioral task
behavioral1
Sample
d3e4c8cdba817d017c2d41a0a4042fb4a725958cca28a92b6bec6f454834860c
Resource
ubuntu1804-amd64-en-20211208
ubuntu-18.04-amd64
0 signatures
150 seconds
General
-
Target
d3e4c8cdba817d017c2d41a0a4042fb4a725958cca28a92b6bec6f454834860c
-
Size
101KB
-
MD5
3712acd190f821298a7d05a67e691a68
-
SHA1
d3aa6cea07a2cd4f0d1a10348d89d6261bbe8c60
-
SHA256
d3e4c8cdba817d017c2d41a0a4042fb4a725958cca28a92b6bec6f454834860c
-
SHA512
a5041b8572c551ba35d87984201e88ad83ad0accc6226843c734ec8a2b47c7de092eacf13a8cd6952e86b62e3a93d1d3fb8186f130a76b91394fa09e5a43b412
-
SSDEEP
3072:wW8FUmgujld6Mkxm6AJ+4fDHmmFVcqq0GnDZT:wJFv4Lm6AJ+4fDHmmFVcqq0GnDZT
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
resource yara_rule sample family_mirai -
Detected Gafgyt variant 1 IoCs
resource yara_rule sample family_gafgyt -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Gafgyt family
-
Mirai family
-
Mirai_x86corona family
Files
-
d3e4c8cdba817d017c2d41a0a4042fb4a725958cca28a92b6bec6f454834860c.elf linux x86