Behavioral task
behavioral1
Sample
559ad29168deb9eba283e453a48558a87c84e6280ff9b343693e2c83e1196e47
Resource
ubuntu1804-amd64-en-20211208
ubuntu-18.04-amd64
2 signatures
150 seconds
General
-
Target
559ad29168deb9eba283e453a48558a87c84e6280ff9b343693e2c83e1196e47
-
Size
98KB
-
MD5
373c1abcdb0958b3ec38e38c46eac696
-
SHA1
38c2298d76d6e50817f0494373dd42e7b8260910
-
SHA256
559ad29168deb9eba283e453a48558a87c84e6280ff9b343693e2c83e1196e47
-
SHA512
1ad6706094550c8fd3587b87eeadd765684008314d2b942b860a752daaff7c3656091ab018342c227b9ac899477c44dc3598cc3b32da9351c55eabf7a6d2fb6d
-
SSDEEP
3072:he7EqeQUHfPyjRJ9rBFKqeVF1QmqoVcqq6GnQOT:heZyo5KqeVPQmqoVcqq6GnQOT
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
resource yara_rule sample family_mirai -
Detected Gafgyt variant 1 IoCs
resource yara_rule sample family_gafgyt -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Gafgyt family
-
Mirai family
-
Mirai_x86corona family
Files
-
559ad29168deb9eba283e453a48558a87c84e6280ff9b343693e2c83e1196e47.elf linux x86