Behavioral task
behavioral1
Sample
5bdbf23d02263a4967870499d2acc1bff89060be091d7ea41f7756fcc6a0407e
Resource
ubuntu1804-amd64-en-20211208
ubuntu-18.04-amd64
0 signatures
150 seconds
General
-
Target
5bdbf23d02263a4967870499d2acc1bff89060be091d7ea41f7756fcc6a0407e
-
Size
130KB
-
MD5
c1c745edac20588e198329f93caaae35
-
SHA1
f67b4d6a9c3042c1f124e5364f97d1319b6c644d
-
SHA256
5bdbf23d02263a4967870499d2acc1bff89060be091d7ea41f7756fcc6a0407e
-
SHA512
75bde70b0db625117ef74618282ffa1142e839467316b1a8262edf17172dac81f46499a2764296aee8fd44b8b2928e72d198b5417d955c92996bf36744add96b
-
SSDEEP
3072:Mb3c3l+KQnWUXCBYAk4BvTdnU+ZBley/Z47jIermq0ichYyeaK0FU:Mbs33O0lRrmq7/Z47Mermq0ichYyeaKD
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
resource yara_rule sample family_mirai -
Detected Gafgyt variant 1 IoCs
resource yara_rule sample family_gafgyt -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Gafgyt family
-
Mirai family
-
Mirai_x86corona family
Files
-
5bdbf23d02263a4967870499d2acc1bff89060be091d7ea41f7756fcc6a0407e.elf linux x86