Behavioral task
behavioral1
Sample
564fbc074a86bedcb3482683e1506d4f797c9ad260d53c2915e28dcfc5b3849f
Resource
ubuntu1804-amd64-en-20211208
ubuntu-18.04-amd64
0 signatures
150 seconds
General
-
Target
564fbc074a86bedcb3482683e1506d4f797c9ad260d53c2915e28dcfc5b3849f
-
Size
153KB
-
MD5
02baa25a55e919eacaab3e26cf7538dd
-
SHA1
e3b7dc77deddc8a9a83aed898fb9407ccd537c04
-
SHA256
564fbc074a86bedcb3482683e1506d4f797c9ad260d53c2915e28dcfc5b3849f
-
SHA512
4d62a0502eeb197687261d3e159b5c483b144e5b6a06c0a2c6b05fb80d0618932fb08d746d4f2a08cc55db08860c028955c2385c80b5032cfdb0a20daa8ac85c
-
SSDEEP
3072:lYRcF+x52xW1TVONYstKZSgBFOlt5MijsLR50+XH90PfNatph1:lTF+qT+SgBMlEijs95xXH90PfNatph1
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
resource yara_rule sample family_mirai -
Detected Gafgyt variant 1 IoCs
resource yara_rule sample family_gafgyt -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Gafgyt family
-
Mirai family
-
Mirai_x86corona family
Files
-
564fbc074a86bedcb3482683e1506d4f797c9ad260d53c2915e28dcfc5b3849f.elf linux x86