Behavioral task
behavioral1
Sample
b019a65d9059a3df90d49601d0667fc9424d34824021f545f678ae98b5d6bbf6
Resource
ubuntu1804-amd64-en-20211208
ubuntu-18.04-amd64
2 signatures
150 seconds
General
-
Target
b019a65d9059a3df90d49601d0667fc9424d34824021f545f678ae98b5d6bbf6
-
Size
120KB
-
MD5
570692cd2af833f37b00a64f460b71d1
-
SHA1
eb59099890ad2b1c8708f7bdccd0c194dfc24f24
-
SHA256
b019a65d9059a3df90d49601d0667fc9424d34824021f545f678ae98b5d6bbf6
-
SHA512
0cd6d1760241adc352bcf18f647bc37e0188cdfd792bc2470d05053152a8f978aeab97da9c49c62894052c9c65d504b29e2b88d0705391197efd5e82b65c2eca
-
SSDEEP
3072:nZTGMoRInSP7Uo1polSI2682xuQyuLng/PD9oY4giAGaJpP:nB2RS+k2exhyuk/PD9oY4giAGaJpP
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
resource yara_rule sample family_mirai -
Detected Gafgyt variant 1 IoCs
resource yara_rule sample family_gafgyt -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Gafgyt family
-
Mirai family
-
Mirai_x86corona family
Files
-
b019a65d9059a3df90d49601d0667fc9424d34824021f545f678ae98b5d6bbf6.elf linux x86