Static task
static1
Behavioral task
behavioral1
Sample
2a0d9783bf40f0b2a50a51f7413ef8665d2b484a37533713b347fb9273a994a0
Resource
ubuntu1804-amd64-en-20211208
0 signatures
0 seconds
General
-
Target
2a0d9783bf40f0b2a50a51f7413ef8665d2b484a37533713b347fb9273a994a0
-
Size
70KB
-
MD5
655931846ddcd68fa40d4eb4c0fa617b
-
SHA1
4f223bbc959e10ae0776a1f2e70e7bcdbc1caaef
-
SHA256
2a0d9783bf40f0b2a50a51f7413ef8665d2b484a37533713b347fb9273a994a0
-
SHA512
04b5cb603ff13ce6d9ddae6113b259c2627f6f6dd4efa0b845d1c6ceb2587acb9cb9780ea741cf93e30010d2cd01200b2d5c72f61b7f43decfd11cc888d127cd
-
SSDEEP
1536:T7Y0MD/NQ27qLfEg8ZW087BZPmF+lVOCjUxfg71:w0MD/C2GLfcsbdZPmElVOCAxfg71
Score
10/10
Malware Config
Signatures
-
Detect Mirai Payload 1 IoCs
resource yara_rule sample family_mirai -
Detected x86corona Mirai Variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Mirai family
-
Mirai_x86corona family
Files
-
2a0d9783bf40f0b2a50a51f7413ef8665d2b484a37533713b347fb9273a994a0.elf linux x86