Behavioral task
behavioral1
Sample
3a492a1009d325ded7ee0b1074d22d86907534a298fbc75a7beaac3715e1a38c
Resource
ubuntu1804-amd64-en-20211208
ubuntu-18.04-amd64
0 signatures
150 seconds
General
-
Target
3a492a1009d325ded7ee0b1074d22d86907534a298fbc75a7beaac3715e1a38c
-
Size
89KB
-
MD5
db6bf621d5000adb651b0bc35168c6fb
-
SHA1
3e6b64addab181114d53a5aad201f0a44fe5df0b
-
SHA256
3a492a1009d325ded7ee0b1074d22d86907534a298fbc75a7beaac3715e1a38c
-
SHA512
47ef1e7de3e6c24ac1ec3400200417a40570b2e0f1d49ceb632779918f94c0180943e294df204e5428311e827284d8c8d6216af25d1e1f5f7e842a139914baea
-
SSDEEP
1536:uNhyQU0fPIR7CGnQWjhFWfsOM/qZtj0ow43LbdPCMgMatV/cRjLA7wDYc:30HIRrnUkOM/q/j0oFLbdXgxD/cR3A7+
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
resource yara_rule sample family_mirai -
Detected Gafgyt variant 1 IoCs
resource yara_rule sample family_gafgyt -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Gafgyt family
-
Mirai family
-
Mirai_x86corona family
Files
-
3a492a1009d325ded7ee0b1074d22d86907534a298fbc75a7beaac3715e1a38c.elf linux x86