Behavioral task
behavioral1
Sample
fd9168e6320ed56e519ab4b1415916d3e0329b9cfdf888f4651c1e035b03e7b7
Resource
ubuntu1804-amd64-en-20211208
0 signatures
150 seconds
General
-
Target
fd9168e6320ed56e519ab4b1415916d3e0329b9cfdf888f4651c1e035b03e7b7
-
Size
102KB
-
MD5
5a173005cba187b939a3906c611ca4a0
-
SHA1
cc27e04907c5ef1fb7e2eded1c19bdf08b4d5f4c
-
SHA256
fd9168e6320ed56e519ab4b1415916d3e0329b9cfdf888f4651c1e035b03e7b7
-
SHA512
6c8ba599b8f6519a8e016b8c14f6e8aaca59fa7ea79981421cb3ea55074c51935c9715a5d25f171f67da26e37ad02a73153d599c5615071296eb200c68093324
-
SSDEEP
3072:wugt5H3OeQvAXGUEo1Aj7D5FE4gqtaadx4:wu4OeJEo1A/D5FE4gqtaadx4
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
Processes:
resource yara_rule sample family_mirai -
Detected Gafgyt variant 1 IoCs
Processes:
resource yara_rule sample family_gafgyt -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
Processes:
resource yara_rule sample family_mirai_x86corona -
Gafgyt family
-
Mirai family
-
Mirai_x86corona family
Files
-
fd9168e6320ed56e519ab4b1415916d3e0329b9cfdf888f4651c1e035b03e7b7.elf linux x86