Behavioral task
behavioral1
Sample
87d14a1bc8b25d7d57f9143dd577d32e
Resource
ubuntu1804-amd64-en-20211208
ubuntu-18.04-amd64
0 signatures
150 seconds
General
-
Target
87d14a1bc8b25d7d57f9143dd577d32e
-
Size
109KB
-
MD5
87d14a1bc8b25d7d57f9143dd577d32e
-
SHA1
47cf189eb76a72a9f369f6e498f29b79d0c59f9c
-
SHA256
17357f022255ac5a1a3043e0779cb14ece3012a7e6f2d8efda119380dde172b8
-
SHA512
fc4e513bc90a5e1966ce7969d61ad2a3d71e9ef4abbcf6403bd417afcba1390215602539c2fbd0bb80f8aee19fce0860f8d3dc09c4f78ad1795e64c93aa4f2b1
-
SSDEEP
3072:2G/PXUw9DCj1e5dLNgvXMbTpK9u9TuntmruOBmST0nYXbg1DE:/h9DCj1wdZgvO6u9Q+uOBmST0nYXbg1g
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
resource yara_rule sample family_mirai -
Detected Gafgyt variant 1 IoCs
resource yara_rule sample family_gafgyt -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Gafgyt family
-
Mirai family
-
Mirai_x86corona family
Files
-
87d14a1bc8b25d7d57f9143dd577d32e.elf linux x86