Behavioral task
behavioral1
Sample
d34a7c8a134c0c1418b865bdb39ace97
Resource
ubuntu1804-amd64-en-20211208
ubuntu-18.04-amd64
0 signatures
150 seconds
General
-
Target
d34a7c8a134c0c1418b865bdb39ace97
-
Size
97KB
-
MD5
d34a7c8a134c0c1418b865bdb39ace97
-
SHA1
144874295f7956845f5f1596866d78c4731cb8d7
-
SHA256
c140eecb5bfc783ec63c423c079a7d2161df869155e3cc0f2e454e4a8f760376
-
SHA512
7fa0df56467d6a690053e54d13d7eaaaf51e58278ab3b23cba4cddd8a980ec5d6d4c3bcf52037518093e321eec8aada4e8a3d32c5567f5dc79679c8ede2be820
-
SSDEEP
3072:uLOqjPQP39VjGWX98732V7kGyNVS5huT87FXnf0OzTyoQQub:uJQP39VjGWXW9NVS5hueFXnf0OzTyoQ7
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
resource yara_rule sample family_mirai -
Detected Gafgyt variant 1 IoCs
resource yara_rule sample family_gafgyt -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Gafgyt family
-
Mirai family
-
Mirai_x86corona family
Files
-
d34a7c8a134c0c1418b865bdb39ace97.elf linux x86