Behavioral task
behavioral1
Sample
561eeeec428f29de2bb2992a3d865ec99861eeddfa3cd38ab6da64a24c42bf21
Resource
ubuntu1804-amd64-en-20211208
ubuntu-18.04-amd64
0 signatures
150 seconds
General
-
Target
561eeeec428f29de2bb2992a3d865ec99861eeddfa3cd38ab6da64a24c42bf21
-
Size
89KB
-
MD5
1403d7bf7cdbd90a29a80c755191803d
-
SHA1
cf25f8f5013a87511b91ba8bba715e7596e1c196
-
SHA256
561eeeec428f29de2bb2992a3d865ec99861eeddfa3cd38ab6da64a24c42bf21
-
SHA512
0300edf6cf3a17b1b997ef006ded18d371b53dbcab49d300140824e0ab30c710e276c708eb69ac6c5395e3578e48ee5036646fe2b9058ad37a5906a78803feb3
-
SSDEEP
1536:UDsc7wsetnH3KjgrpWpMNKku7Ta34TDMud7EgMatutc4ROG7gnqc:kxAH3ov2NKku7TaeDYgxstc4kG7gnqc
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
resource yara_rule sample family_mirai -
Detected Gafgyt variant 1 IoCs
resource yara_rule sample family_gafgyt -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Gafgyt family
-
Mirai family
-
Mirai_x86corona family
Files
-
561eeeec428f29de2bb2992a3d865ec99861eeddfa3cd38ab6da64a24c42bf21.elf linux x86