Behavioral task
behavioral1
Sample
54d536536c98c67572eb012a840e55074ad85f066c29bb32d9b7b1b9c4fe143b
Resource
ubuntu1804-amd64-en-20211208
ubuntu-18.04-amd64
0 signatures
150 seconds
General
-
Target
54d536536c98c67572eb012a840e55074ad85f066c29bb32d9b7b1b9c4fe143b
-
Size
89KB
-
MD5
9bbe82a7e9db7a8d37b867a898acd263
-
SHA1
39c50c59b8f19353933a1245eafeb54948a02acb
-
SHA256
54d536536c98c67572eb012a840e55074ad85f066c29bb32d9b7b1b9c4fe143b
-
SHA512
0abcadcc5c4d9112de274481286404fe4d2f98c888f26a9c39e70fd5baebafb2dc58cfaf3bfb6119a0318657e86456d8659b56c40c4a94ddbc0a23265e34d703
-
SSDEEP
1536:KWMWNGsnm1UHtcuJX6/3PYUOXXtpdM35FIL6EQvetMatK0tc4POGEg0qc:JMcKUNlJy3PYnXdpOsL6Fvetx3tc4WG4
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
resource yara_rule sample family_mirai -
Detected Gafgyt variant 1 IoCs
resource yara_rule sample family_gafgyt -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Gafgyt family
-
Mirai family
-
Mirai_x86corona family
Files
-
54d536536c98c67572eb012a840e55074ad85f066c29bb32d9b7b1b9c4fe143b.elf linux x86