Behavioral task
behavioral1
Sample
d5914d041b6db9027c35999a66ab4c0dc17a066fb114405400b49a8a6997b2b4
Resource
ubuntu1804-amd64-en-20211208
0 signatures
150 seconds
General
-
Target
d5914d041b6db9027c35999a66ab4c0dc17a066fb114405400b49a8a6997b2b4
-
Size
112KB
-
MD5
57891b3aafeb9866690afc5280a2d826
-
SHA1
d96f82df8e4b81a608a3c6e268a774ce5d145bff
-
SHA256
d5914d041b6db9027c35999a66ab4c0dc17a066fb114405400b49a8a6997b2b4
-
SHA512
6eb0d550e462f45adead26dee49257ce56640272b05f098538dd1458796155d399c7c61ca02464ae925f9e5c36d107cf5a47081adff6fca9bff4b7eb95f9dd0a
-
SSDEEP
3072:qIZG2RxU0U1ROSkJJrKvNRObn2aHhD90xDYzjmoTadjfn:qIBVuRzkJEFSbHhDOxDYzjmoTadjfn
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
Processes:
resource yara_rule sample family_mirai -
Detected Gafgyt variant 1 IoCs
Processes:
resource yara_rule sample family_gafgyt -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
Processes:
resource yara_rule sample family_mirai_x86corona -
Gafgyt family
-
Mirai family
-
Mirai_x86corona family
Files
-
d5914d041b6db9027c35999a66ab4c0dc17a066fb114405400b49a8a6997b2b4.elf linux x86