Behavioral task
behavioral1
Sample
c3a1dd2e31b7c8158f7fe24a59e0bda1c592322a26abf9a799f164ce453b653d
Resource
ubuntu1804-amd64-en-20211208
ubuntu-18.04-amd64
2 signatures
150 seconds
General
-
Target
c3a1dd2e31b7c8158f7fe24a59e0bda1c592322a26abf9a799f164ce453b653d
-
Size
124KB
-
MD5
4d755623106c0b456e6346d7564a7c2c
-
SHA1
c6444e84af12f408c19923ed110c63df0c3458fa
-
SHA256
c3a1dd2e31b7c8158f7fe24a59e0bda1c592322a26abf9a799f164ce453b653d
-
SHA512
73865eb04d28f6e483df45f99dcf67fdc8254db1c9887cb9a9eab25610906e61de93f08c16b740c52c9ad26f9c1e879adb958bc5b15555e32ab2e6ce47aac8ac
-
SSDEEP
3072:klRQb0fgTpzmtRhnebZo8w+VxUuMvsCxg5GVlD9oY4giAGaJpP:klRQb0fyzmtRJ8KrsCxg5ElD9oY4giAz
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
resource yara_rule sample family_mirai -
Detected Gafgyt variant 1 IoCs
resource yara_rule sample family_gafgyt -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Gafgyt family
-
Mirai family
-
Mirai_x86corona family
Files
-
c3a1dd2e31b7c8158f7fe24a59e0bda1c592322a26abf9a799f164ce453b653d.elf linux x86