Behavioral task
behavioral1
Sample
f5f36ee3279c1920708dd7eb978c1e62988f4f045ed4c4719e45e28762a9a3d3
Resource
ubuntu1804-amd64-en-20211208
ubuntu-18.04-amd64
0 signatures
150 seconds
General
-
Target
f5f36ee3279c1920708dd7eb978c1e62988f4f045ed4c4719e45e28762a9a3d3
-
Size
85KB
-
MD5
63a757a08407402f2c490936f257866e
-
SHA1
40300d579aadd7a909fc3f126df5f5968235020b
-
SHA256
f5f36ee3279c1920708dd7eb978c1e62988f4f045ed4c4719e45e28762a9a3d3
-
SHA512
85abfc4d92675971c8661d890f600fdd4b1082e89412985b59a3ed6e64ecae94e632f5f4f95ae3b64e5096e9330ee4e2e01e335e59217a85ddbf0370e2b5baec
-
SSDEEP
1536:EXOyeJgnUMI6cYxdSgxpPVCrw8D3xexX5FqlMs1x+bqSn3tsLtT/0R6fA7jwBc:EXYAUM5dxdPpPIrw8TxkGJ+bqc3tmx/0
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
resource yara_rule sample family_mirai -
Detected Gafgyt variant 1 IoCs
resource yara_rule sample family_gafgyt -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Gafgyt family
-
Mirai family
-
Mirai_x86corona family
Files
-
f5f36ee3279c1920708dd7eb978c1e62988f4f045ed4c4719e45e28762a9a3d3.elf linux x86