Static task
static1
Behavioral task
behavioral1
Sample
41572bdb7d2b12b51b2c60e02b597053
Resource
ubuntu1804-amd64-en-20211025
linux_amd64
0 signatures
0 seconds
General
-
Target
41572bdb7d2b12b51b2c60e02b597053
-
Size
88KB
-
MD5
41572bdb7d2b12b51b2c60e02b597053
-
SHA1
064f5aa8fada562cc98166a87a1a609c8bf1f771
-
SHA256
7c1829cd134ffc87b2b719a240d6c69fee4175a2f2642cd7a2b0d674a096104d
-
SHA512
91fd82d6b1759176cdd45946c695e1025f6dc2114a50bb422813e8c314ffd8239bb385dd5eac781b700f38d25253aba0b0c7178fafc5e57c4d784ee8cc7fd8ac
Score
10/10
Malware Config
Signatures
-
Detect Mirai Payload 1 IoCs
Processes:
resource yara_rule sample family_mirai -
Detected x86corona Mirai Variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
Processes:
resource yara_rule sample family_mirai_x86corona -
Mirai family
-
Mirai_x86corona family
Files
-
41572bdb7d2b12b51b2c60e02b597053.elf linux x86