Behavioral task
behavioral1
Sample
963bd4ad1d4fe161b563059f486f41aa
Resource
ubuntu1804-amd64-20231222-en
5 signatures
150 seconds
General
-
Target
963bd4ad1d4fe161b563059f486f41aa
-
Size
5.1MB
-
MD5
963bd4ad1d4fe161b563059f486f41aa
-
SHA1
616c5c379dca6c61d464a4fe8b667a34cd39e4cb
-
SHA256
4bd36f1e696c178dea88714f19d836650a324a6b053e60ca845662e8ebdb4db7
-
SHA512
a4dd1404f646db85c93db8a38d8a3de39eed03744c5394822aaf81745c8daa163ae41f7cd325cb57d3a26b997c163b39cac01dbfaabe5541bb506f19e25f3184
-
SSDEEP
49152:2wSs7sHIMQcw1JSkknSDwY9qdY0Zst9Hm8KMiEj8ZsmwPh68rtmvngsmS5m+A:7HvMTEsgwYMv0m/kd0M8s+A
Score
10/10
Malware Config
Signatures
-
Golang_generic_botnet family
-
XMRig Miner payload 1 IoCs
resource yara_rule sample family_xmrig -
Xmrig family
-
golang_generic_dropper_component 1 IoCs
Detects 'dropper' component for dropping additional files.
resource yara_rule sample golang_generic_dropper_component
Files
-
963bd4ad1d4fe161b563059f486f41aa.elf linux x64