Behavioral task
behavioral1
Sample
c358f6e8893c5fbaf3a733f4648cc677
Resource
ubuntu1804-amd64-en-20211208
ubuntu-18.04-amd64
0 signatures
150 seconds
General
-
Target
c358f6e8893c5fbaf3a733f4648cc677
-
Size
113KB
-
MD5
c358f6e8893c5fbaf3a733f4648cc677
-
SHA1
435e32b2a7c914beb5887220e50689847879d76f
-
SHA256
8a5b47949e119f41d0bd0eba2f882ffe4340a79094f646da2e874ded8ed5ac9e
-
SHA512
dabca078b2ff47d88b319ce6d61d5c88ba2844b5d701a28bd35163598a2936ddefd9ed19c584b6f52d919dcfd56b0dd8e9c2a3f95c85719a6d49699c3a061b9e
-
SSDEEP
3072:j98HdmPaFGq5PBSVjDW6iw7qLQ68E97JEXPk7fD162TVntJ9jsEmST0nYXbg1DE:juH8+5PBSVjDW6XNu1EXPOfD162vfsEL
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
resource yara_rule sample family_mirai -
Detected Gafgyt variant 1 IoCs
resource yara_rule sample family_gafgyt -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Gafgyt family
-
Mirai family
-
Mirai_x86corona family
Files
-
c358f6e8893c5fbaf3a733f4648cc677.elf linux x86