Static task
static1
Behavioral task
behavioral1
Sample
354cd2749ad5da34c6f47e1f4967e198660fd754fd8170d9546e8f1407f95201
Resource
ubuntu1804-amd64-en-20211208
0 signatures
0 seconds
General
-
Target
354cd2749ad5da34c6f47e1f4967e198660fd754fd8170d9546e8f1407f95201
-
Size
75KB
-
MD5
7285e351908509c9d6dd97f9860485e0
-
SHA1
000af7cd22398a500e5d168dd5c7afe8a833cfaa
-
SHA256
354cd2749ad5da34c6f47e1f4967e198660fd754fd8170d9546e8f1407f95201
-
SHA512
9d8af2d053ea9a34ff94c7af57089af21e0bdbcd7c24f3f347c2198fc03c14d1ef21670120ffc1470cd0b98908f683687492b5993ab7ed546ebb7787b0800527
-
SSDEEP
1536:oHpY6PTVDPZYVjXW71xwU4d0/PZWd+mDFb9c9u34j9aBRm0+lhACbmZfupw:oHbTVDPZYVjXW7nr4d0/ksmDFueX7mbE
Score
10/10
Malware Config
Signatures
-
Detect Mirai Payload 1 IoCs
resource yara_rule sample family_mirai -
Detected x86corona Mirai Variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Mirai family
-
Mirai_x86corona family
Files
-
354cd2749ad5da34c6f47e1f4967e198660fd754fd8170d9546e8f1407f95201.elf linux x86