Behavioral task
behavioral1
Sample
70384eadd10aad38e110bed4525450bf4a3332a502f76c454dcc8dfae9a09bb2
Resource
ubuntu1804-amd64-en-20211208
ubuntu-18.04-amd64
0 signatures
150 seconds
General
-
Target
70384eadd10aad38e110bed4525450bf4a3332a502f76c454dcc8dfae9a09bb2
-
Size
85KB
-
MD5
dd559a6b9122fd8efab59693d0b831a0
-
SHA1
b22524d5a60be5f5c677bdbc802c9f27360a0cfd
-
SHA256
70384eadd10aad38e110bed4525450bf4a3332a502f76c454dcc8dfae9a09bb2
-
SHA512
e86658cbc3f05299a24db9ec3ab4eb72b39d9c8501924fafc045dcfa449d4ccbc611697a8fbb510dbe6144905b4ce9d1d2928b8ea2ee26083c195311de78031a
-
SSDEEP
1536:kUN1CXRxgAUMDDuBrZzCOZCxowqXpK5GXixm75h5jGoKJlrOYm7she0QzUzJYQ2t:ZNGpUMfuBrMOZ6ohpKoz5h5jGoOls7UY
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
resource yara_rule sample family_mirai -
Detected Gafgyt variant 1 IoCs
resource yara_rule sample family_gafgyt -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Gafgyt family
-
Mirai family
-
Mirai_x86corona family
Files
-
70384eadd10aad38e110bed4525450bf4a3332a502f76c454dcc8dfae9a09bb2.elf linux x86