Behavioral task
behavioral1
Sample
5b652fdbe7b68357900833f44e4c32ee009fb61ebce508b0cf6dc99958d42a14
Resource
ubuntu1804-amd64-en-20211208
ubuntu-18.04-amd64
0 signatures
150 seconds
General
-
Target
5b652fdbe7b68357900833f44e4c32ee009fb61ebce508b0cf6dc99958d42a14
-
Size
89KB
-
MD5
837673db15e6b414e8c7d038ab1712d5
-
SHA1
b1d6fb9600f5af1e950f267b992b33c1181182d3
-
SHA256
5b652fdbe7b68357900833f44e4c32ee009fb61ebce508b0cf6dc99958d42a14
-
SHA512
0d38768fef02d05da8ab732f15ea39a9d9cd8cdb910c51559cbd181e63e2499001253cec5f78da8f19e9a740625f2f744842438ea91da513f39277c09f134e98
-
SSDEEP
1536:y9zE4IEtvP8mko3UzOegB2i89+FDfbh8YShPL8fTA6Qm5hCh+llLTgKkG7she0Ql:8pIQU8Ux02R9kDfbaYwPL49R5hC2H/7N
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
resource yara_rule sample family_mirai -
Detected Gafgyt variant 1 IoCs
resource yara_rule sample family_gafgyt -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Gafgyt family
-
Mirai family
-
Mirai_x86corona family
Files
-
5b652fdbe7b68357900833f44e4c32ee009fb61ebce508b0cf6dc99958d42a14.elf linux x86