Behavioral task
behavioral1
Sample
9cc0bf8956134301c0777a8547a004eab7fabadb37ace54df0c5a16c66cc1ae5
Resource
ubuntu1804-amd64-en-20211208
0 signatures
150 seconds
General
-
Target
9cc0bf8956134301c0777a8547a004eab7fabadb37ace54df0c5a16c66cc1ae5
-
Size
148KB
-
MD5
95a2536a2660430e95c52d7d2efaa88e
-
SHA1
665f1e1cf7cd0648ed8903cca2ecb488b50abfe7
-
SHA256
9cc0bf8956134301c0777a8547a004eab7fabadb37ace54df0c5a16c66cc1ae5
-
SHA512
a82ea31f9165c3859a49bfc538a53441b74f8f2a8b8eed6ea68a3bd29db81c774ee9275301cb8cf8337c8c58ff58af34273ced01a01ef1504087278c4aaebba0
-
SSDEEP
3072:H6pvTqTmdNUfle11pZkpJqRwOlVGiPlh2vpupRwWriH90PfNatph1:qTqYmGECRnlrdgvpSiH90PfNatph1
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
Processes:
resource yara_rule sample family_mirai -
Detected Gafgyt variant 1 IoCs
Processes:
resource yara_rule sample family_gafgyt -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
Processes:
resource yara_rule sample family_mirai_x86corona -
Gafgyt family
-
Mirai family
-
Mirai_x86corona family
Files
-
9cc0bf8956134301c0777a8547a004eab7fabadb37ace54df0c5a16c66cc1ae5.elf linux x86