Static task
static1
Behavioral task
behavioral1
Sample
2a4a12a9e5dcea44ae2b7cdd34e8818aec22d3dd924e9d9e6a4044646307b8f3
Resource
ubuntu1804-amd64-en-20211208
0 signatures
0 seconds
General
-
Target
2a4a12a9e5dcea44ae2b7cdd34e8818aec22d3dd924e9d9e6a4044646307b8f3
-
Size
101KB
-
MD5
c845416fd1a21fafcf2df6a90bac4a58
-
SHA1
3e1161bd57088a5143ab81677cdf64e2f0caf2fb
-
SHA256
2a4a12a9e5dcea44ae2b7cdd34e8818aec22d3dd924e9d9e6a4044646307b8f3
-
SHA512
5d0a00c64eb8bce10f69e46dd5db036a47c75c678e46c3a709ad08fb67fc90f09d72e9efca5eb0edc42c5bcd082871c2835d6d2aaa4e34bc7ea5b38cbb85aa83
-
SSDEEP
3072:xFe53p9WeQhgFHQGRqdHz+trtC9eqRyBsi4+5mZ/W:xFe53pkVmHjEt0r4+5mB
Score
10/10
Malware Config
Signatures
-
Detect Mirai Payload 1 IoCs
resource yara_rule sample family_mirai -
Detected x86corona Mirai Variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Mirai family
-
Mirai is a prevalent Linux malware infecting exposed network devices 1 IoCs
Detected Mirai Linux malware
resource yara_rule sample elf_mirai_auto -
Mirai_x86corona family
Files
-
2a4a12a9e5dcea44ae2b7cdd34e8818aec22d3dd924e9d9e6a4044646307b8f3.elf linux x86