Behavioral task
behavioral1
Sample
800dd06c9274936173559b9b3e70c86ba202e2ae3ec44e482db895274be4dd7e
Resource
ubuntu1804-amd64-en-20211208
ubuntu-18.04-amd64
0 signatures
150 seconds
General
-
Target
800dd06c9274936173559b9b3e70c86ba202e2ae3ec44e482db895274be4dd7e
-
Size
109KB
-
MD5
23c9c691616c252c0e22733de164b1b2
-
SHA1
cfd8fa12f475abcc7bd77ec9fab61a81139c1c0a
-
SHA256
800dd06c9274936173559b9b3e70c86ba202e2ae3ec44e482db895274be4dd7e
-
SHA512
06671e2091080155cd26fdbb7914d1f131805006ca1d31fcebe13d6a4085ff3fad90c5a2ced898375d0a16f6585f34c9b5e3a712e757d8e64950408ade20512b
-
SSDEEP
3072:2D/eX4Q9DCj1E59/tBv8MbzpK9OdbAntHLuOBmST0nYXbg1DE:ia9DCj1e9VB0u6OdKruOBmST0nYXbg1g
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
resource yara_rule sample family_mirai -
Detected Gafgyt variant 1 IoCs
resource yara_rule sample family_gafgyt -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Gafgyt family
-
Mirai family
-
Mirai_x86corona family
Files
-
800dd06c9274936173559b9b3e70c86ba202e2ae3ec44e482db895274be4dd7e.elf linux x86