Behavioral task
behavioral1
Sample
5f90dd0263206a1105461951091e79d2cd8762745917111bbfbae36266029253
Resource
ubuntu1804-amd64-en-20211208
ubuntu-18.04-amd64
0 signatures
150 seconds
General
-
Target
5f90dd0263206a1105461951091e79d2cd8762745917111bbfbae36266029253
-
Size
102KB
-
MD5
f4d2b3925ac94c44950b8a40bf13122f
-
SHA1
dbcfe853a442b7774abff36d08a3639fea0fcb7b
-
SHA256
5f90dd0263206a1105461951091e79d2cd8762745917111bbfbae36266029253
-
SHA512
2bf5ba108f05b77562ddee3164e45707b8cf20767405789f9335df9c01ea9a4ee00794dbd5ef5670d7fd3aec112a7fefd3d7557aeed17007d473418c3977e54c
-
SSDEEP
3072:Hab/HG/9cJT/GIjk1HwOD5FE4gqtaadx4:Ha737Vjk1HfD5FE4gqtaadx4
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
resource yara_rule sample family_mirai -
Detected Gafgyt variant 1 IoCs
resource yara_rule sample family_gafgyt -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Gafgyt family
-
Mirai family
-
Mirai_x86corona family
Files
-
5f90dd0263206a1105461951091e79d2cd8762745917111bbfbae36266029253.elf linux x86