Behavioral task
behavioral1
Sample
def7f2e0768e9759d976c8a4da50ccf2b22ab2a005dbc949313e13d95237537d
Resource
ubuntu1804-amd64-en-20211208
1 signatures
150 seconds
General
-
Target
def7f2e0768e9759d976c8a4da50ccf2b22ab2a005dbc949313e13d95237537d
-
Size
93KB
-
MD5
08a66a920d65eac66366cd1df97e489b
-
SHA1
4845bfbb85ba7f3a4da770502cf559e21d07cae0
-
SHA256
def7f2e0768e9759d976c8a4da50ccf2b22ab2a005dbc949313e13d95237537d
-
SHA512
5e2a4816d9de8cb212817d94a6dc8055f264f8a0f458b029696a45b19af8f9369ae578a503c882e0ab7e446df3c6d35a319284eae9ade8ded8738476e03f6ad9
-
SSDEEP
1536:tbfP66xAoA2UvUMTNYaC4P3fOG+bxozBDyF2i6pmg5hgsDDuk+be2PM/0KvjP8sT:BfhxAoBUvUMxCA3fp+VGBD82f5hgsDDt
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
resource yara_rule sample family_mirai -
Detected Gafgyt variant 1 IoCs
resource yara_rule sample family_gafgyt -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Gafgyt family
-
Mirai family
-
Mirai_x86corona family
Files
-
def7f2e0768e9759d976c8a4da50ccf2b22ab2a005dbc949313e13d95237537d.elf linux x86