Static task
static1
Behavioral task
behavioral1
Sample
312f9497a6839b44a89215b49315417a4bc7388d817f4cd956975d2dc78372f9
Resource
ubuntu1804-amd64-en-20211208
0 signatures
0 seconds
General
-
Target
312f9497a6839b44a89215b49315417a4bc7388d817f4cd956975d2dc78372f9
-
Size
87KB
-
MD5
9c8a503da274aae5ee04aab2e50a99dc
-
SHA1
9252e0b85193d95a2716eee18aadabe3f32195d0
-
SHA256
312f9497a6839b44a89215b49315417a4bc7388d817f4cd956975d2dc78372f9
-
SHA512
3b1da50e3a9ab5ebf867672e55186fe236af82b4cb93ca12910f0b1a7ef756cf754e6af3e76b4658f3d60a2c9dd62956f789b4dd629842b370e429f2902a4542
-
SSDEEP
1536:H+oIR8RXii8yXml89Tvnfhd0hsQTkJluFbwHL5SPsLOnPGJUkft3LR52wm:H+4RfWWdvnJdapAJowr5csLOnOJUkfxq
Score
10/10
Malware Config
Signatures
-
Detect Mirai Payload 1 IoCs
resource yara_rule sample family_mirai -
Detected x86corona Mirai Variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Detects Kaiten/Tsunami Payload 2 IoCs
resource yara_rule sample family_kaiten sample family_kaiten2 -
Kaiten family
-
Mirai family
-
Mirai_x86corona family
Files
-
312f9497a6839b44a89215b49315417a4bc7388d817f4cd956975d2dc78372f9.elf linux x86