Behavioral task
behavioral1
Sample
c1d8a9e79dae8ad5cc52482c0c7049eed0ddef73411de4bf72b4b208c2320738
Resource
ubuntu1804-amd64-en-20211208
ubuntu-18.04-amd64
2 signatures
150 seconds
General
-
Target
c1d8a9e79dae8ad5cc52482c0c7049eed0ddef73411de4bf72b4b208c2320738
-
Size
98KB
-
MD5
f134dc96caad1bff2814144cda978fe5
-
SHA1
3635eb50b858d7b5fa92bf2c9020b6d01a008df9
-
SHA256
c1d8a9e79dae8ad5cc52482c0c7049eed0ddef73411de4bf72b4b208c2320738
-
SHA512
a20543d7a918caa5922e0bc07e786b14f2579d82cdcc00f64e3a112db46dcbd78a8c2c59acecd0726b60a76f78c7a08e7ff936c4ae25fb13aa7f18b51fa12abf
-
SSDEEP
3072:he7EqeQUHfPyjRJ9rBFKqJ3F1QmqoVcqq6GnQOT:heZyo5KqJ3PQmqoVcqq6GnQOT
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
resource yara_rule sample family_mirai -
Detected Gafgyt variant 1 IoCs
resource yara_rule sample family_gafgyt -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Gafgyt family
-
Mirai family
-
Mirai_x86corona family
Files
-
c1d8a9e79dae8ad5cc52482c0c7049eed0ddef73411de4bf72b4b208c2320738.elf linux x86