Behavioral task
behavioral1
Sample
5b02989d715a72f920c9994568e76b3fa37971099feeddf257d2c5380aea0661
Resource
ubuntu1804-amd64-en-20211208
ubuntu-18.04-amd64
2 signatures
150 seconds
General
-
Target
5b02989d715a72f920c9994568e76b3fa37971099feeddf257d2c5380aea0661
-
Size
121KB
-
MD5
bcf7fd2227e7fa6f3b4746f24211ecd8
-
SHA1
aae58dec3209b070e2d993a58054d9f0d2b76959
-
SHA256
5b02989d715a72f920c9994568e76b3fa37971099feeddf257d2c5380aea0661
-
SHA512
07783ea389814342b0529d2437a3325343f72ea7282acb293247540a37aa5127ca98f2fd768755ba05842160ba8b276c3d68e48949c37ff2e237e18640a259e1
-
SSDEEP
3072:iQlA8RXiHU6jPZLyM0XSBImD4qg6TxKmql8chT93a6puM:iQKtRjPFOV2gyEmql8chT93a6puM
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
resource yara_rule sample family_mirai -
Detected Gafgyt variant 1 IoCs
resource yara_rule sample family_gafgyt -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Gafgyt family
-
Mirai family
-
Mirai_x86corona family
Files
-
5b02989d715a72f920c9994568e76b3fa37971099feeddf257d2c5380aea0661.elf linux x86