Behavioral task
behavioral1
Sample
f0fd78780edb7e2e12eab1809ba662e0931f43f99433b7969e92cf81a179960d
Resource
ubuntu1804-amd64-en-20211208
ubuntu-18.04-amd64
0 signatures
150 seconds
General
-
Target
f0fd78780edb7e2e12eab1809ba662e0931f43f99433b7969e92cf81a179960d
-
Size
97KB
-
MD5
3cf8e676e74406b855441b49aa6a0785
-
SHA1
eda89a8e22de7e8a8a16524262e6d76dd1202059
-
SHA256
f0fd78780edb7e2e12eab1809ba662e0931f43f99433b7969e92cf81a179960d
-
SHA512
8806f16d163aab3c76faa51ff3386ea512e4d784d4cc215719af9b326a5a5c70a9aee398217e4c7f40733933d87d3d2fee3aca004c971f0d3cdc343e2a9842fe
-
SSDEEP
3072:dmk869zNm8/wTwiUk/JhXuJmmFVcqq0GnDZT:d069k0I/JhXuJmmFVcqq0GnDZT
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
resource yara_rule sample family_mirai -
Detected Gafgyt variant 1 IoCs
resource yara_rule sample family_gafgyt -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Gafgyt family
-
Mirai family
-
Mirai_x86corona family
Files
-
f0fd78780edb7e2e12eab1809ba662e0931f43f99433b7969e92cf81a179960d.elf linux x86