Behavioral task
behavioral1
Sample
7c12dc0fd65bee82129d32a9115e10b1
Resource
ubuntu1804-amd64-en-20211208
ubuntu-18.04-amd64
0 signatures
150 seconds
General
-
Target
7c12dc0fd65bee82129d32a9115e10b1
-
Size
72KB
-
MD5
7c12dc0fd65bee82129d32a9115e10b1
-
SHA1
8fb00288ba7e96bcfab38171459a89e700ad5830
-
SHA256
68676789cd439ef625abe51bf62c07e73e56f85e4ba2f6e6e5bf3242c14dcc10
-
SHA512
1c37c9ef300175fa986deb0f4939fdca1dbdba6ce3a3a60cd2f1eec185874e01a76233cd651fd75df026b6c6d5069d92dc8aebfb47152a1bf15b2326485eeaee
-
SSDEEP
1536:nm+c5osQWiKLoxKFn6pD+OTxzMUMmLI2VOCjXUfJRk:45omr0xKFn6J+ObMmU2VOCbUfJRk
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
Processes:
resource yara_rule sample family_mirai -
Detected Gafgyt variant 1 IoCs
Processes:
resource yara_rule sample family_gafgyt -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
Processes:
resource yara_rule sample family_mirai_x86corona -
Gafgyt family
-
Mirai family
-
Mirai_x86corona family
Files
-
7c12dc0fd65bee82129d32a9115e10b1.elf linux x86