Static task
static1
Behavioral task
behavioral1
Sample
da404ff6c1d462b7616fbd23842ac47e
Resource
ubuntu-amd64
Behavioral task
behavioral2
Sample
da404ff6c1d462b7616fbd23842ac47e
Resource
debian9-mipsel
Behavioral task
behavioral3
Sample
da404ff6c1d462b7616fbd23842ac47e
Resource
debian9-mipsbe
General
-
Target
da404ff6c1d462b7616fbd23842ac47e
-
Size
86KB
-
MD5
da404ff6c1d462b7616fbd23842ac47e
-
SHA1
86415158d006731ba7b3b09b2fe596343c23bdd5
-
SHA256
dff7fc2d5b6223be757205a75dc2cee13475c3fb7ebdb6efb26007e4ddc12367
-
SHA512
5b98bbfb24a7ca9cd5de930d95b34afe8aace8b4c046d9eb638d77ab7af5b76a7472681ef35ec55ce2aec738b3a82d9ffc70cecfff3d94567806ce76185548ce
Malware Config
Signatures
-
Detected x86corona Mirai Variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
Processes:
resource yara_rule sample family_mirai_x86corona -
Mirai family
-
Mirai is a prevalent Linux malware infecting exposed network devices 1 IoCs
Detected Mirai Linux malware
Processes:
resource yara_rule sample elf_mirai_auto -
Mirai_x86corona family
Files
-
da404ff6c1d462b7616fbd23842ac47e.elf linux x86