Behavioral task
behavioral1
Sample
9a64fefd3060c1644b8d7f227f408956d0061102297dc64c6bcec4c0919d53e4
Resource
ubuntu1804-amd64-en-20211208
0 signatures
150 seconds
General
-
Target
9a64fefd3060c1644b8d7f227f408956d0061102297dc64c6bcec4c0919d53e4
-
Size
148KB
-
MD5
939542783e9c9d5beacdf175a3790388
-
SHA1
d8aa7e32fc9603a16bb7d7219363c511fe161071
-
SHA256
9a64fefd3060c1644b8d7f227f408956d0061102297dc64c6bcec4c0919d53e4
-
SHA512
c6d3e4de4b500930856794403f36e67985e2e3e4ed9db39a141a6552b1be0391a23bf2c35292a93fa3249efc72bcd9da5519b18f34867735bc474368cf4f2a9d
-
SSDEEP
3072:HyZ/lm1dUnle11pZkpJqRnOlVGgPlh7oZpRwWriH90PfNatph1:KeOGECROlNdGiH90PfNatph1
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
Processes:
resource yara_rule sample family_mirai -
Detected Gafgyt variant 1 IoCs
Processes:
resource yara_rule sample family_gafgyt -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
Processes:
resource yara_rule sample family_mirai_x86corona -
Gafgyt family
-
Mirai family
-
Mirai_x86corona family
Files
-
9a64fefd3060c1644b8d7f227f408956d0061102297dc64c6bcec4c0919d53e4.elf linux x86