Static task
static1
Behavioral task
behavioral1
Sample
351ccd96175b31d6aac4f09a2b0cd4aac2a6d8392e21dc1747225488fb6d9258
Resource
ubuntu1804-amd64-en-20211208
linux_amd64
0 signatures
0 seconds
General
-
Target
351ccd96175b31d6aac4f09a2b0cd4aac2a6d8392e21dc1747225488fb6d9258
-
Size
97KB
-
MD5
9e025326816889bf4a805ce6b63919e0
-
SHA1
58bc72c9dbedd33cf8b5fd374a267f5043cf812a
-
SHA256
351ccd96175b31d6aac4f09a2b0cd4aac2a6d8392e21dc1747225488fb6d9258
-
SHA512
4fe08508fcb6dd6f3d1df4601886a44d9dac8f90c32f66274e3f2f24503b2aca3da131b3201335f3ec750b10c6d96db64040e1f06de9d281f9307cf7024324b4
-
SSDEEP
3072:VvQeu7WSYdIH687lFZEiis32M35dEeEGgtCokIg8zcCLu:xZu7WStdRf2M35dEdvtCokIg8zcCLu
Score
10/10
Malware Config
Signatures
-
Detect Mirai Payload 1 IoCs
resource yara_rule sample family_mirai -
Detected x86corona Mirai Variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Detects Kaiten/Tsunami Payload 1 IoCs
resource yara_rule sample family_kaiten2 -
Kaiten family
-
Mirai family
-
Mirai_x86corona family
Files
-
351ccd96175b31d6aac4f09a2b0cd4aac2a6d8392e21dc1747225488fb6d9258.elf linux x86