Behavioral task
behavioral1
Sample
e63513686a7bc0048f489bce0dcd40168af9f5847b85aa35fe0e9b2c2c42897e
Resource
ubuntu1804-amd64-en-20211208
0 signatures
150 seconds
General
-
Target
e63513686a7bc0048f489bce0dcd40168af9f5847b85aa35fe0e9b2c2c42897e
-
Size
105KB
-
MD5
134962898fcf687f5d3bfe1f09aab948
-
SHA1
685783b94f26f00457261291e09d4b4d29d765b6
-
SHA256
e63513686a7bc0048f489bce0dcd40168af9f5847b85aa35fe0e9b2c2c42897e
-
SHA512
c2d0dba5d13ef08566fbfdad2fd10f1b6fb746b87d45c2e45f9762d26f978340ff098ebf7f781feef53058aa47dda7408ddc30d9337a8c7119c4d68b2a8a6a41
-
SSDEEP
3072:4VqAkIB/EgwDdTdyfRRfRKBMWa6m+vcBmST0LMBbgwIv:4Qg/EgwDdpyveMWGccBmST0LMBbgwIv
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
Processes:
resource yara_rule sample family_mirai -
Detected Gafgyt variant 1 IoCs
Processes:
resource yara_rule sample family_gafgyt -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
Processes:
resource yara_rule sample family_mirai_x86corona -
Gafgyt family
-
Mirai family
-
Mirai_x86corona family
Files
-
e63513686a7bc0048f489bce0dcd40168af9f5847b85aa35fe0e9b2c2c42897e.elf linux x86