Behavioral task
behavioral1
Sample
2ee17b710250cbe10f222bd0262e66ec
Resource
ubuntu1804-amd64-en-20211208
ubuntu-18.04-amd64
0 signatures
150 seconds
General
-
Target
2ee17b710250cbe10f222bd0262e66ec
-
Size
97KB
-
MD5
2ee17b710250cbe10f222bd0262e66ec
-
SHA1
a093a369b8c9da9693c67c4f048b7104577da58c
-
SHA256
619c8cc2d40d05860d4aa550516cd26e6608d64c9c782b9a1d326129b2b2d611
-
SHA512
58c948797793474914d25dada490d0fc14f5cacb854542e847636abf03f920fad5e83d0c2564a8f186c54166b5811d302fe72be91c703a561e684ff7fe4792f7
-
SSDEEP
3072:dUICodUWUh917j8mc2deiPUDAZURyPfv5hVTFvxinf0OzTyoQQub:tdRu917j8mc2H5Z5PX5h1pxinf0OzTyv
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
resource yara_rule sample family_mirai -
Detected Gafgyt variant 1 IoCs
resource yara_rule sample family_gafgyt -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Gafgyt family
-
Mirai family
-
Mirai_x86corona family
Files
-
2ee17b710250cbe10f222bd0262e66ec.elf linux x86