Behavioral task
behavioral1
Sample
60db674e5d647a4c8a581264b9e2ef75767a356f4e359e33fdd13970414a3abf
Resource
ubuntu1804-amd64-en-20211208
ubuntu-18.04-amd64
0 signatures
150 seconds
General
-
Target
60db674e5d647a4c8a581264b9e2ef75767a356f4e359e33fdd13970414a3abf
-
Size
81KB
-
MD5
ed57c7caa0f4df1feb20ca08b7c47caa
-
SHA1
da37a252237a8d8a861976958c60cd00ee0b827a
-
SHA256
60db674e5d647a4c8a581264b9e2ef75767a356f4e359e33fdd13970414a3abf
-
SHA512
8fabbab2acf35553290e76187518f84194cd7d8b9418a965b6a18d7b15d46c5cd657009e77123d4b7e448ceef12277038a6b56105cb0e689fbebb2a7b5a2466a
-
SSDEEP
1536:RX11UviuLsJlka7X76sv75xaRef9eg/kp95FKNAw19eoIs6h3skYoafLrGPVu:RX11UqJlka7esv7jaRCh/GsNAw6dskYl
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
resource yara_rule sample family_mirai -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Detects Kaiten/Tsunami Payload 1 IoCs
resource yara_rule sample family_kaiten2 -
Kaiten family
-
Mirai family
-
Mirai_x86corona family
Files
-
60db674e5d647a4c8a581264b9e2ef75767a356f4e359e33fdd13970414a3abf.elf linux x86