Static task
static1
Behavioral task
behavioral1
Sample
17f57f1ce07dc160ffadddaa7ec46ad15f05baa61940b3517e894c182fe323f5
Resource
ubuntu1804-amd64-en-20211208
0 signatures
0 seconds
General
-
Target
17f57f1ce07dc160ffadddaa7ec46ad15f05baa61940b3517e894c182fe323f5
-
Size
66KB
-
MD5
a3add7a7e6459c5457ed75f5f14cb384
-
SHA1
e3bb19cd5541d87a315f901f71f3c532157e6dae
-
SHA256
17f57f1ce07dc160ffadddaa7ec46ad15f05baa61940b3517e894c182fe323f5
-
SHA512
6a05791a8f59781d9df0fb2f7af444eacb239b5b763115b73525ada3acaf0eb57741876d73251867cbdb5706e7701b2b7342775d37576cb519137b5e460a89fd
-
SSDEEP
1536:RRVYPCNH1jUdOn4JymPWBSgSh1MtNBr/NbHBDSDmd+l2OZ/fufYEZ:RRUCNH1gdikrEHM1I7rVbJSDmMl2OZXa
Score
10/10
Malware Config
Signatures
-
Detect Mirai Payload 1 IoCs
resource yara_rule sample family_mirai -
Detected x86corona Mirai Variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Mirai family
-
Mirai_x86corona family
Files
-
17f57f1ce07dc160ffadddaa7ec46ad15f05baa61940b3517e894c182fe323f5.elf linux x86