Behavioral task
behavioral1
Sample
ae006f289dcc2e9f43a651424225320d5e9d950e605a3d0c4b85306316ca5d11
Resource
ubuntu1804-amd64-en-20211208
2 signatures
150 seconds
General
-
Target
ae006f289dcc2e9f43a651424225320d5e9d950e605a3d0c4b85306316ca5d11
-
Size
93KB
-
MD5
d1f2ba561ca8ab9bdb53f9b3f63a5e91
-
SHA1
c05588bb2345199a6216c606f40ce9ed514fd7de
-
SHA256
ae006f289dcc2e9f43a651424225320d5e9d950e605a3d0c4b85306316ca5d11
-
SHA512
c47f789bbf7faeca56092201e15dd36c1179ec2d27c4773265c07db8c91ada67774dce0ff1c46336a672f0fd4b562f17a3f39b24d15d678eb32844ee05b74e3c
-
SSDEEP
1536:2Swafh5cfDj5lLWybWGKt/QFPYv/KDU7OclmmEequN4cGb1Mh7yMLN2UcYV:o85cbj5BWfjt41sCDUrgmDD7GbSh7yMj
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
Processes:
resource yara_rule sample family_mirai -
Detected Gafgyt variant 1 IoCs
Processes:
resource yara_rule sample family_gafgyt -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
Processes:
resource yara_rule sample family_mirai_x86corona -
Gafgyt family
-
Mirai family
-
Mirai_x86corona family
Files
-
ae006f289dcc2e9f43a651424225320d5e9d950e605a3d0c4b85306316ca5d11.elf linux x86