Behavioral task
behavioral1
Sample
21137bb49ecf55f00ecaf65e0f89934a
Resource
ubuntu1804-amd64-en-20211208
ubuntu-18.04-amd64
2 signatures
150 seconds
General
-
Target
21137bb49ecf55f00ecaf65e0f89934a
-
Size
169KB
-
MD5
21137bb49ecf55f00ecaf65e0f89934a
-
SHA1
9946cc990b029d652aa0e004e8b0c391066959e0
-
SHA256
493f8a0f3e5e80cce26c62d680626dbedc12d4ff81f71919f6e4a29532a41261
-
SHA512
702a2c4323932eb068b7b8122e589bb9f35d9d4a694125d13ec00b1303bf65798018d9c9278603718d059321843ecb870ae534b1e51f27e74ca261c4e657a632
-
SSDEEP
3072:XLzzZSJfrIYmIEBdQQknNsK1JvMSVbNYUegUDmD9oE4gqXaah84:XLzzEr4B5knNr1JvMSVbNYUegUaD9oEq
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
resource yara_rule sample family_mirai -
Detected Gafgyt variant 1 IoCs
resource yara_rule sample family_gafgyt -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Gafgyt family
-
Mirai family
-
Mirai_x86corona family
Files
-
21137bb49ecf55f00ecaf65e0f89934a.elf linux x86