Static task
static1
Behavioral task
behavioral1
Sample
abf20baa99ee0623ab15be6bbf0c97ec
Resource
ubuntu-amd64
linux_amd64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
abf20baa99ee0623ab15be6bbf0c97ec
Resource
debian9-mipsel
linux_mipsel
0 signatures
0 seconds
Behavioral task
behavioral3
Sample
abf20baa99ee0623ab15be6bbf0c97ec
Resource
debian9-mipsbe
linux_mips
0 signatures
0 seconds
General
-
Target
abf20baa99ee0623ab15be6bbf0c97ec
-
Size
81KB
-
MD5
abf20baa99ee0623ab15be6bbf0c97ec
-
SHA1
5476c987c4d154ebf85fa4111860e7489b72121f
-
SHA256
45c562c5b76209e40f60618abb52e1a28633aeb28a2d17bee2cc96eaba1757f6
-
SHA512
7aae70cd66d12bc480e9cfa25ee9782757af8ce74ebfa3c3e0d121c4123f04ddb5fc53969bec0936e42648d4e09055e8630ccfe3c06f1484ff9c4c677f983d24
Score
10/10
Malware Config
Signatures
-
Mirai family
-
Mirai is a prevalent Linux malware infecting exposed network devices 1 IoCs
Detected Mirai Linux malware
Processes:
resource yara_rule sample elf_mirai_auto
Files
-
abf20baa99ee0623ab15be6bbf0c97ec.elf linux x86