Behavioral task
behavioral1
Sample
55cf357e2f4e275adb1a3b9bfe46597c0d95655599baa45166ef591b215cecc8
Resource
ubuntu1804-amd64-en-20211208
0 signatures
150 seconds
General
-
Target
55cf357e2f4e275adb1a3b9bfe46597c0d95655599baa45166ef591b215cecc8
-
Size
86KB
-
MD5
605d37b60ff22b78f5ea4c0547fc42b9
-
SHA1
44fb41ec25b908bd3ec2118253c50a85e9557af4
-
SHA256
55cf357e2f4e275adb1a3b9bfe46597c0d95655599baa45166ef591b215cecc8
-
SHA512
051da5dc528edd679d118bb5793a90e5c72f63b5ab6c62d622b0879a564158151ccd644da48d9a3c4b01422e054335e0600b3f4028baec022adbda406a434529
-
SSDEEP
1536:V44wE1Icbs+UzVV13Kp1FDdEloVXlRI1reHAWj5hinq+7she0QzUzJYQ2Wk:VVwjgUpD3K9DdUoBXIte55hiN7Ue0QzR
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
Processes:
resource yara_rule sample family_mirai -
Detected Gafgyt variant 1 IoCs
Processes:
resource yara_rule sample family_gafgyt -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
Processes:
resource yara_rule sample family_mirai_x86corona -
Gafgyt family
-
Mirai family
-
Mirai_x86corona family
Files
-
55cf357e2f4e275adb1a3b9bfe46597c0d95655599baa45166ef591b215cecc8.elf linux x86