Behavioral task
behavioral1
Sample
f8df6e7a032786161dd95a622859ed387a6bc4b771be088d19876bd3e6a9d28d
Resource
ubuntu1804-amd64-en-20211208
0 signatures
150 seconds
General
-
Target
f8df6e7a032786161dd95a622859ed387a6bc4b771be088d19876bd3e6a9d28d
-
Size
89KB
-
MD5
a727bff1ce01524efee1dceb1616484c
-
SHA1
84464bfe586e416f2b425a73d9f7082d6987164c
-
SHA256
f8df6e7a032786161dd95a622859ed387a6bc4b771be088d19876bd3e6a9d28d
-
SHA512
3e9b33ce6f4e4ebbdd197670338977fdfcebb6649dc5d536c83c589d3bfe189646f5ef9912fe04a80fef97f8c09f9d777faa9cbd9eece87d7b2a71838b0776de
-
SSDEEP
1536:HpLWu7c+8U6zRndMbWWiPaeWKhgDc9Trki45Flu71tMatV/cRjLA7wDYc:JLSxU6zRdMriPaenh4urZ2u71txD/cR9
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
resource yara_rule sample family_mirai -
Detected Gafgyt variant 1 IoCs
resource yara_rule sample family_gafgyt -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Gafgyt family
-
Mirai family
-
Mirai_x86corona family
Files
-
f8df6e7a032786161dd95a622859ed387a6bc4b771be088d19876bd3e6a9d28d.elf linux x86