Behavioral task
behavioral1
Sample
3d16df6740519d29be64cfcaf956bd81.elf
Resource
ubuntu1804-amd64-en-20211208
ubuntu-18.04-amd64
1 signatures
150 seconds
General
-
Target
3d16df6740519d29be64cfcaf956bd81.elf
-
Size
72KB
-
MD5
3d16df6740519d29be64cfcaf956bd81
-
SHA1
1b8bf55a5379be5a4a98ba245893bd7a79b0b40b
-
SHA256
36f924989bf3c22630c857b3b8ad1ef728e79f7d475cd0fd8aa2cfdc5c04760b
-
SHA512
f218db160538794622f297484ea921f6a25883ed9833c63018c41691dd630199e07db38f2a1bbf6d596b2dee164f49579273fcf0793bac62752f41d7be419579
-
SSDEEP
1536:0+xNVpGQWuKv8xKBnq5PeOj5zMLkS5qmLI2VOCjXUfJRk:nNT830xKBnq9eGrS5qmU2VOCbUfJRk
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
resource yara_rule sample family_mirai -
Detected Gafgyt variant 1 IoCs
resource yara_rule sample family_gafgyt -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Gafgyt family
-
Mirai family
-
Mirai_x86corona family
Files
-
3d16df6740519d29be64cfcaf956bd81.elf.elf linux x86