Behavioral task
behavioral1
Sample
c2644f6fb5d2125cfc6d0d7f6bc5d57056e494ccbee9f78272f39a1194fdf75a
Resource
ubuntu1804-amd64-en-20211208
ubuntu-18.04-amd64
0 signatures
150 seconds
General
-
Target
c2644f6fb5d2125cfc6d0d7f6bc5d57056e494ccbee9f78272f39a1194fdf75a
-
Size
80KB
-
MD5
fff5fb6be4d1622ea244a9478e595ad1
-
SHA1
4aaef5dcf15b896b0c88499767406e026b9211a1
-
SHA256
c2644f6fb5d2125cfc6d0d7f6bc5d57056e494ccbee9f78272f39a1194fdf75a
-
SHA512
a308e70254670c5f02923fdc6a8785fa2993bff994f3c0e6c4c03c6183527772adc6342fc05e348907510baa0f589fd999ad18a54772fde2274e1e76a1e4060b
-
SSDEEP
1536:29nhOInUMU1U1UB1zGo5vr5e29swl4FoAo9bRN5mAANeiLZMgOljYbQReR:+n5nUMU1U1UB1N5vrT9sqKov53oeidMU
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
resource yara_rule sample family_mirai -
Detected Gafgyt variant 1 IoCs
resource yara_rule sample family_gafgyt -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Gafgyt family
-
Mirai family
-
Mirai_x86corona family
Files
-
c2644f6fb5d2125cfc6d0d7f6bc5d57056e494ccbee9f78272f39a1194fdf75a.elf linux x86