Behavioral task
behavioral1
Sample
f71969740bbe38b1788782ddf0f41a942032f82d62feb4b8a9994cd7f6e371fe
Resource
ubuntu1804-amd64-en-20211208
2 signatures
150 seconds
General
-
Target
f71969740bbe38b1788782ddf0f41a942032f82d62feb4b8a9994cd7f6e371fe
-
Size
91KB
-
MD5
c2bb469356bda78e407ce12a4987c7ed
-
SHA1
88e73d986d4b0b19789e4fe7c4a317b0ced9e6f2
-
SHA256
f71969740bbe38b1788782ddf0f41a942032f82d62feb4b8a9994cd7f6e371fe
-
SHA512
7ebd579dc1f83c9e7c92ac669b45b092cfb4a50bb67b125f22b27b0921bb78393c1475247cf8f50147fecf9842c0292359525f6d6d1243fa99475df61a0b3678
-
SSDEEP
1536:h9O91OMJIUeUN3NCa0LUCWG3CeQoQcr9lh3aNXoc01WE7DUgl/hR/6S2F21Mh7yw:h9HMGUeUNEa0LaG3jQoQsDh348oE7DUd
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
resource yara_rule sample family_mirai -
Detected Gafgyt variant 1 IoCs
resource yara_rule sample family_gafgyt -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Gafgyt family
-
Mirai family
-
Mirai_x86corona family
Files
-
f71969740bbe38b1788782ddf0f41a942032f82d62feb4b8a9994cd7f6e371fe.elf linux x86