Static task
static1
Behavioral task
behavioral1
Sample
2a69e920dfa8d9cad2b9baedcd5625162d4231de4c8a0e47948328afd079e31b
Resource
ubuntu1804-amd64-en-20211208
0 signatures
0 seconds
General
-
Target
2a69e920dfa8d9cad2b9baedcd5625162d4231de4c8a0e47948328afd079e31b
-
Size
70KB
-
MD5
0fd6ed8a0fe6d5663cf141d95ee3b3d3
-
SHA1
e7f13c89cdf4f55f0598cb59a10e3d6397315b5d
-
SHA256
2a69e920dfa8d9cad2b9baedcd5625162d4231de4c8a0e47948328afd079e31b
-
SHA512
a2eeb951b784d6a9ec26f26c39380b46e1a2679d2efe68b019c6e5415ac62830be753b68aed0618abcf29717631393146fbc2e7dcfda516c57d16783dcb619d6
-
SSDEEP
1536:mEY0af/NQ27qLfEg8ZW087fZPmF+lVOCjUxfg71:a0af/C2GLfcsbbZPmElVOCAxfg71
Score
10/10
Malware Config
Signatures
-
Detect Mirai Payload 1 IoCs
resource yara_rule sample family_mirai -
Detected x86corona Mirai Variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Mirai family
-
Mirai_x86corona family
Files
-
2a69e920dfa8d9cad2b9baedcd5625162d4231de4c8a0e47948328afd079e31b.elf linux x86