Behavioral task
behavioral1
Sample
5d6a5e553925a9b13a84d6fcb616f482741169fe0a397bda14b861af72278f0f
Resource
ubuntu1804-amd64-en-20211208
ubuntu-18.04-amd64
0 signatures
150 seconds
General
-
Target
5d6a5e553925a9b13a84d6fcb616f482741169fe0a397bda14b861af72278f0f
-
Size
80KB
-
MD5
fd9f29843f2bd9217355efc38bc15c24
-
SHA1
63826c817af98bcfc33aba2339e52650e599afd5
-
SHA256
5d6a5e553925a9b13a84d6fcb616f482741169fe0a397bda14b861af72278f0f
-
SHA512
05c2e690d5bf323a7d38ef97f33bf41782ec386a20a24d7ddfad03d18ed598925f8a36a618938b4a7c2806f9614de2630b75c4988261f668b16d48db3e8bb47e
-
SSDEEP
1536:5tFPivp/+1WAkQuQyzAT0KbkZTjfJIFCgXLZMgOljYbQReR:9ivpxLQlyzAT0hjXgXdMgOlsbQReR
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
resource yara_rule sample family_mirai -
Detected Gafgyt variant 1 IoCs
resource yara_rule sample family_gafgyt -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Gafgyt family
-
Mirai family
-
Mirai_x86corona family
Files
-
5d6a5e553925a9b13a84d6fcb616f482741169fe0a397bda14b861af72278f0f.elf linux x86