Behavioral task
behavioral1
Sample
b0b59d6518658173be28d5f5124f21cec6f486ee48e54451d31b1153ba03d171
Resource
ubuntu1804-amd64-en-20211208
ubuntu-18.04-amd64
0 signatures
150 seconds
General
-
Target
b0b59d6518658173be28d5f5124f21cec6f486ee48e54451d31b1153ba03d171
-
Size
88KB
-
MD5
9f5539855206f18972bdba5b20964871
-
SHA1
cd74570fa3d93dc7b5f8eb255aa1c35fa5e5ca35
-
SHA256
b0b59d6518658173be28d5f5124f21cec6f486ee48e54451d31b1153ba03d171
-
SHA512
22e3f5cb55f2c6749aa3ca9ecb57d45a536c2115bcc7ff850b67d965a32ec930af7c0485471afff5552e7df2ff49e2910bcb0c64b69206adfc9421f78ae18257
-
SSDEEP
1536:7PYZ+aJKWsmUsgK+SQyqYKrYWlmQjL/jqiBE3V+awHL5pseTClnsPGJUkft3LR56:7PYcmBgK+nxUQjL/jZEQawr5pseTGsOI
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
resource yara_rule sample family_mirai -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Detects Kaiten/Tsunami Payload 1 IoCs
resource yara_rule sample family_kaiten2 -
Detects Kaiten/Tsunami payload 1 IoCs
resource yara_rule sample family_kaiten -
Kaiten family
-
Mirai family
-
Mirai_x86corona family
Files
-
b0b59d6518658173be28d5f5124f21cec6f486ee48e54451d31b1153ba03d171.elf linux x86