Behavioral task
behavioral1
Sample
ab86a8ac2340df4422f2c9fe7447431aadb43bc4424bb76ce16d69e873e6ac4c
Resource
ubuntu1804-amd64-en-20211208
ubuntu-18.04-amd64
0 signatures
150 seconds
General
-
Target
ab86a8ac2340df4422f2c9fe7447431aadb43bc4424bb76ce16d69e873e6ac4c
-
Size
74KB
-
MD5
bce5ce1f1ab8610f9318aa80fb04ec28
-
SHA1
46f55e46bd0e31aee2062d4e3ddfac01422bd51b
-
SHA256
ab86a8ac2340df4422f2c9fe7447431aadb43bc4424bb76ce16d69e873e6ac4c
-
SHA512
ce5c78c05fd9236e36b94ec0955b9ad82b213a1fadc313de69419fbab2aa9c65aac7549f0681ba1a2cfb32649b80c14d2bbd98034af95f13326fa6765665ec69
-
SSDEEP
1536:lgr77I4z2pWfsSG4s6Ck6scktO3KzwD82K9QZQTmL+cVOCPBZfYzS:C7tzNEp4s6Ckvc36cDYTmKcVOCpZfYzS
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
resource yara_rule sample family_mirai -
Detected Gafgyt variant 1 IoCs
resource yara_rule sample family_gafgyt -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Gafgyt family
-
Mirai family
-
Mirai_x86corona family
Files
-
ab86a8ac2340df4422f2c9fe7447431aadb43bc4424bb76ce16d69e873e6ac4c.elf linux x86