Behavioral task
behavioral1
Sample
5a67328f3b0d191f22e0f65fba08156b886fdd45acf4b28f74e0b78c8878b2bc
Resource
ubuntu1804-amd64-en-20211208
ubuntu-18.04-amd64
2 signatures
150 seconds
General
-
Target
5a67328f3b0d191f22e0f65fba08156b886fdd45acf4b28f74e0b78c8878b2bc
-
Size
111KB
-
MD5
a684550231cbd0ca99f9edd9a24b4ad2
-
SHA1
753e48f8212247ef770d05c267ffc76fecc66564
-
SHA256
5a67328f3b0d191f22e0f65fba08156b886fdd45acf4b28f74e0b78c8878b2bc
-
SHA512
7b2fe3b66d7af2454a726e014f93f409b9c8b329e0ff6cfa7929da3455cb9064ba41bfd47d50ae260d2b5a78451db2c31c7453e5683cf96a9ac79f96849bb2ca
-
SSDEEP
3072:8Y0DRYUKG9JzVv3btiS/QjzWWZHmqKScqqvWnfme:8YLQ9zDZQjz3ZHmqKScqqvWnfme
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
resource yara_rule sample family_mirai -
Detected Gafgyt variant 1 IoCs
resource yara_rule sample family_gafgyt -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Gafgyt family
-
Mirai family
-
Mirai_x86corona family
Files
-
5a67328f3b0d191f22e0f65fba08156b886fdd45acf4b28f74e0b78c8878b2bc.elf linux x86