Behavioral task
behavioral1
Sample
d9c23aff89eb39eb4f7e637dd2c27d8e76e14684d0ede30b944bc600e84fb78c
Resource
ubuntu1804-amd64-en-20211208
2 signatures
150 seconds
General
-
Target
d9c23aff89eb39eb4f7e637dd2c27d8e76e14684d0ede30b944bc600e84fb78c
-
Size
164KB
-
MD5
a4bc356758ff177aa00bc6de572d006d
-
SHA1
57f07b0a252a7cd12102a95cde7898dbbfa64fae
-
SHA256
d9c23aff89eb39eb4f7e637dd2c27d8e76e14684d0ede30b944bc600e84fb78c
-
SHA512
4acd3c3afa3e0c58d5fc4e8f56971c2f505934685118482dcc0cb2c755cc98e8218cc6032fc4160a67dcdd4c22b17ddbb8327c25f957c7e0f2fe16599c3ffda1
-
SSDEEP
3072:GNauPcTV89dDjf5nKcETeJLKTd3gPNi/pMetJ8add9QzTsaRT+H93/modtAvfV3C:G/cTi9dDjf5nKckyouUpMetJ8addQl+p
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
Processes:
resource yara_rule sample family_mirai -
Detected Gafgyt variant 1 IoCs
Processes:
resource yara_rule sample family_gafgyt -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
Processes:
resource yara_rule sample family_mirai_x86corona -
Gafgyt family
-
Mirai family
-
Mirai_x86corona family
Files
-
d9c23aff89eb39eb4f7e637dd2c27d8e76e14684d0ede30b944bc600e84fb78c.elf linux x86