Static task
static1
Behavioral task
behavioral1
Sample
e4fafd804c7c9cf29326d4203a74333b211799798cb49d87adb45b9c52938bec
Resource
ubuntu-amd64
linux_amd64
0 signatures
0 seconds
General
-
Target
e4fafd804c7c9cf29326d4203a74333b211799798cb49d87adb45b9c52938bec
-
Size
53KB
-
MD5
e58047e2dfd9b04eb4dbe1d61d0cd185
-
SHA1
7e9e04980fd270bc39697ee18a64751e333a5287
-
SHA256
e4fafd804c7c9cf29326d4203a74333b211799798cb49d87adb45b9c52938bec
-
SHA512
784e22d7e7fb68b8aa54eac8ddb9407fe2ab8c2345b557e8e1da45a1c0172248294fa0366449813a083a5d2274ef3ba8ec29bdf2c24ad26fde612b38a3791e41
Score
10/10
Malware Config
Signatures
-
Mirai family
-
Mirai is a prevalent Linux malware infecting exposed network devices 1 IoCs
Detected Mirai Linux malware
Processes:
resource yara_rule sample elf_mirai_auto
Files
-
e4fafd804c7c9cf29326d4203a74333b211799798cb49d87adb45b9c52938bec.elf linux x64