Behavioral task
behavioral1
Sample
5d28d58d0b1767518097622bba18c42dabbc8113e171dcf77d055d721e62fb44
Resource
ubuntu1804-amd64-en-20211208
ubuntu-18.04-amd64
0 signatures
150 seconds
General
-
Target
5d28d58d0b1767518097622bba18c42dabbc8113e171dcf77d055d721e62fb44
-
Size
98KB
-
MD5
d9a5ff21d32f921ff262ff5de440e42d
-
SHA1
1ada64602e1ebf4916a72a2024b6356522f315ac
-
SHA256
5d28d58d0b1767518097622bba18c42dabbc8113e171dcf77d055d721e62fb44
-
SHA512
f3918c73edc65cc0db05b8b6a5e34a0b05650abd16bd23a259ee031170fa9362c73bf80ad7d2d51619a6a84660f15ab5c8a8c12a5421f73dc222ab8e109ae060
-
SSDEEP
3072:kZ5SLib+EMdfNUaIqGcRezMUi1Xg4NKcXUGcgf2K:kxy+3qGec4g4NKcX3cgf2K
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
resource yara_rule sample family_mirai -
Detected Gafgyt variant 1 IoCs
resource yara_rule sample family_gafgyt -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Gafgyt family
-
Mirai family
-
Mirai_x86corona family
Files
-
5d28d58d0b1767518097622bba18c42dabbc8113e171dcf77d055d721e62fb44.elf linux x86