Behavioral task
behavioral1
Sample
5abef7a8a5af9b716aef0518b31304ed6050bf71fe42dfa70965da84a5da576c
Resource
ubuntu1804-amd64-en-20211208
ubuntu-18.04-amd64
0 signatures
150 seconds
General
-
Target
5abef7a8a5af9b716aef0518b31304ed6050bf71fe42dfa70965da84a5da576c
-
Size
148KB
-
MD5
a2247189896304c44307a7d678280c2a
-
SHA1
8184206c30f15fc8478bb9da97ceb290fb1967bf
-
SHA256
5abef7a8a5af9b716aef0518b31304ed6050bf71fe42dfa70965da84a5da576c
-
SHA512
28e3f33fa3e8fe56ad3f3755db984a7b7884259581471c1b6dc12d3925a4988b940210205feb189649748fb466e4f8c4fe579f5b30aabbb293b27d0e5a07103c
-
SSDEEP
3072:HW5f5GpNUTle11pZkpJqRCOlVGZPlhwnvpRwWriH90PfNatph1:meaGECRhlEdCnJiH90PfNatph1
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
resource yara_rule sample family_mirai -
Detected Gafgyt variant 1 IoCs
resource yara_rule sample family_gafgyt -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Gafgyt family
-
Mirai family
-
Mirai_x86corona family
Files
-
5abef7a8a5af9b716aef0518b31304ed6050bf71fe42dfa70965da84a5da576c.elf linux x86