Behavioral task
behavioral1
Sample
9ed273a479e390693291dba0500283adb258951b24ab51dfed51d4f8a0b36ff3
Resource
ubuntu1804-amd64-en-20211208
ubuntu-18.04-amd64
2 signatures
150 seconds
General
-
Target
9ed273a479e390693291dba0500283adb258951b24ab51dfed51d4f8a0b36ff3
-
Size
103KB
-
MD5
55ad7db4c404fecc43dcd47ad7b7c4ae
-
SHA1
a7fed7aa54ed383b02dae750f7ea236c0de9a0ae
-
SHA256
9ed273a479e390693291dba0500283adb258951b24ab51dfed51d4f8a0b36ff3
-
SHA512
a004e1af9aa579dcf08957c5d382e2ed8c4ea6cdc47eb3fe9efac16ac389053b7301cb8d6591ad7d55657870e7966dccdafc417be420b9bb95437b1089705533
-
SSDEEP
3072:ILJUlZBy1ps8zvk61yA1QqJmUrF2Dx8AIY/AhvjE:IL6lepsUn1BJmUp2Dx8AIY/AhvjE
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
resource yara_rule sample family_mirai -
Detected Gafgyt variant 1 IoCs
resource yara_rule sample family_gafgyt -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Gafgyt family
-
Mirai family
-
Mirai_x86corona family
Files
-
9ed273a479e390693291dba0500283adb258951b24ab51dfed51d4f8a0b36ff3.elf linux x86