Behavioral task
behavioral1
Sample
4fbeb734c95e3026225128e2433cae46d33c307bdeef60a7def86d30d80c50ff
Resource
ubuntu1804-amd64-en-20211208
ubuntu-18.04-amd64
2 signatures
150 seconds
General
-
Target
4fbeb734c95e3026225128e2433cae46d33c307bdeef60a7def86d30d80c50ff
-
Size
124KB
-
MD5
29a7f9ab5437f0fe8e51124eee0b9fea
-
SHA1
19167457cda458b2146b082d20de3e028a50fe86
-
SHA256
4fbeb734c95e3026225128e2433cae46d33c307bdeef60a7def86d30d80c50ff
-
SHA512
41fba3e1bfd06e6465397ee59f5f93993f8fa1b549931ff044d2cce693ae343d8d161e4f30aa7424f73d6b43fd4931040b1e0612e6a177467dbb565a5245b275
-
SSDEEP
3072:EXY5gzI24XRFnHb2ohcQeFxfusim3Z3OhzD9oY4giAGaJpP:EXY5BDXR9dc5Om3Z34zD9oY4giAGaJpP
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
resource yara_rule sample family_mirai -
Detected Gafgyt variant 1 IoCs
resource yara_rule sample family_gafgyt -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Gafgyt family
-
Mirai family
-
Mirai_x86corona family
Files
-
4fbeb734c95e3026225128e2433cae46d33c307bdeef60a7def86d30d80c50ff.elf linux x86