Behavioral task
behavioral1
Sample
15cdfb8ac8342ff0783b0bf7847b86a1.elf
Resource
ubuntu1804-amd64-en-20211208
ubuntu-18.04-amd64
0 signatures
150 seconds
General
-
Target
15cdfb8ac8342ff0783b0bf7847b86a1.elf
-
Size
97KB
-
MD5
15cdfb8ac8342ff0783b0bf7847b86a1
-
SHA1
c0b333e3050c7e62f71fc6a95a1743289aedfb86
-
SHA256
86660ec94c0803597303712823ab42e480eb6b6426bada990417e2079920b590
-
SHA512
a5d891bd85961514742f157ad360eefc5a5cb809409e630991c7cf00e3773ff0938eba485a4acecbd600e24cc9a96e23070b85e7d3d10bf2d1addda63c4790b8
-
SSDEEP
3072:aPaqjPQP39VjGWX98732V7kGyNVE5heTe7FXnf0OzTyoQQub:ahQP39VjGWXW9NVE5h+0FXnf0OzTyoQ7
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
resource yara_rule sample family_mirai -
Detected Gafgyt variant 1 IoCs
resource yara_rule sample family_gafgyt -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Gafgyt family
-
Mirai family
-
Mirai_x86corona family
Files
-
15cdfb8ac8342ff0783b0bf7847b86a1.elf.elf linux x86