Behavioral task
behavioral1
Sample
618ed5c07ab66408af31110fb0caa92ff745c4c37e81d89f2a0bf6445668b5bb
Resource
ubuntu1804-amd64-en-20211208
ubuntu-18.04-amd64
0 signatures
150 seconds
General
-
Target
618ed5c07ab66408af31110fb0caa92ff745c4c37e81d89f2a0bf6445668b5bb
-
Size
148KB
-
MD5
1bfce428a79f3ebd38b3077641024325
-
SHA1
1e6bc8b5013c2432dffd403b31f5ed9111240f0f
-
SHA256
618ed5c07ab66408af31110fb0caa92ff745c4c37e81d89f2a0bf6445668b5bb
-
SHA512
f5f29b28a3799877100569df3a7655fd4cc67f8f083c404ea6697ddf94f253bd599704f0c7c124fed091968912eb916cbf56b1eec49346a2a0fdb7595cf16205
-
SSDEEP
3072:HW5f5GpNUTle11pZkpJqR6OlVGZPlhcnTpRwWriH90PfNatph1:meaGECRplEdGnViH90PfNatph1
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
resource yara_rule sample family_mirai -
Detected Gafgyt variant 1 IoCs
resource yara_rule sample family_gafgyt -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Gafgyt family
-
Mirai family
-
Mirai_x86corona family
Files
-
618ed5c07ab66408af31110fb0caa92ff745c4c37e81d89f2a0bf6445668b5bb.elf linux x86