Static task
static1
Behavioral task
behavioral1
Sample
365d0dcdfea01e340f7bd9b3a4ef90ca
Resource
ubuntu-amd64
Behavioral task
behavioral2
Sample
365d0dcdfea01e340f7bd9b3a4ef90ca
Resource
debian9-mipsel
Behavioral task
behavioral3
Sample
365d0dcdfea01e340f7bd9b3a4ef90ca
Resource
debian9-mipsbe
General
-
Target
365d0dcdfea01e340f7bd9b3a4ef90ca
-
Size
57KB
-
MD5
365d0dcdfea01e340f7bd9b3a4ef90ca
-
SHA1
8b799ede4392b40252f77d4142c8a8c0e8c9ffde
-
SHA256
49b5eb8551f6205a47f8e46e7e4cec79585b00ce61edf68869ac5bf0cbeb68d2
-
SHA512
7d43305b2a4f19cef7ae0e079b8f4240065df1d77f93a731b5f666cd3c3604780871ee8e68e8223bb93c61291db51160f84abfa380f86e2d6b01f12a16914e1f
Malware Config
Signatures
-
Detected x86corona Mirai Variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
Processes:
resource yara_rule sample family_mirai_x86corona -
Mirai family
-
Mirai is a prevalent Linux malware infecting exposed network devices 1 IoCs
Detected Mirai Linux malware
Processes:
resource yara_rule sample elf_mirai_auto -
Mirai_x86corona family
Files
-
365d0dcdfea01e340f7bd9b3a4ef90ca.elf linux x86