Behavioral task
behavioral1
Sample
a4dd9c5a8c4d732afe261bb02b8919aec85fd0d5c983d38dbd84d9ac38e7b77d
Resource
ubuntu1804-amd64-en-20211208
ubuntu-18.04-amd64
0 signatures
150 seconds
General
-
Target
a4dd9c5a8c4d732afe261bb02b8919aec85fd0d5c983d38dbd84d9ac38e7b77d
-
Size
97KB
-
MD5
a58f7d321e0f9799b49597d2c9b909b1
-
SHA1
4a7e96e010796038aa9b109ee56abeab84019694
-
SHA256
a4dd9c5a8c4d732afe261bb02b8919aec85fd0d5c983d38dbd84d9ac38e7b77d
-
SHA512
3aa640c3c606a8c262c63063e0ee8818f9dee50f3bb92faac8fbfeb0ba4ff948c351d9a8ca5e1c1951fb1d191e0567cdb4573e84af74d0a76c489bc1e6772a86
-
SSDEEP
3072:VK1z13U6HzHoXRtmTUhQoguEmmFVcqq0GnDZT:VK7DDeKloguEmmFVcqq0GnDZT
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
resource yara_rule sample family_mirai -
Detected Gafgyt variant 1 IoCs
resource yara_rule sample family_gafgyt -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Gafgyt family
-
Mirai family
-
Mirai_x86corona family
Files
-
a4dd9c5a8c4d732afe261bb02b8919aec85fd0d5c983d38dbd84d9ac38e7b77d.elf linux x86