Behavioral task
behavioral1
Sample
5b083b1ec2e4bf049633bd64b3e856a8baac43e79c099c7034ad5d6f03dae6cf
Resource
ubuntu1804-amd64-en-20211208
ubuntu-18.04-amd64
2 signatures
150 seconds
General
-
Target
5b083b1ec2e4bf049633bd64b3e856a8baac43e79c099c7034ad5d6f03dae6cf
-
Size
124KB
-
MD5
7351114ec11aeca42464ab033a0c957e
-
SHA1
c69b964a307a1a110cd8559912e8a00093cc7034
-
SHA256
5b083b1ec2e4bf049633bd64b3e856a8baac43e79c099c7034ad5d6f03dae6cf
-
SHA512
be6170de8ec65c546d9085f559fc9df54eae11f481b3f8154e28ce88e7dda4b20650146179d198e8fc8f1cd855546f2d364d3b666b2d49be3ceaec60850f5414
-
SSDEEP
3072:QbqCkOz3UoA0iG3WB+yGe6vhEhcDLoY4giAGaJpP:QbqCVpAjN3IvhCcDLoY4giAGaJpP
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
resource yara_rule sample family_mirai -
Detected Gafgyt variant 1 IoCs
resource yara_rule sample family_gafgyt -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Gafgyt family
-
Mirai family
-
Mirai_x86corona family
Files
-
5b083b1ec2e4bf049633bd64b3e856a8baac43e79c099c7034ad5d6f03dae6cf.elf linux x86