Static task
static1
Behavioral task
behavioral1
Sample
308d21bb210e5f8496706e231ec4e6c8639eb3c95676fc244c8af0976ab4d39a
Resource
ubuntu1804-amd64-en-20211208
linux_amd64
0 signatures
0 seconds
General
-
Target
308d21bb210e5f8496706e231ec4e6c8639eb3c95676fc244c8af0976ab4d39a
-
Size
72KB
-
MD5
4520a8408bffa6a2340dc53b704288b1
-
SHA1
c038d323de86328d2ed93f5b16e7bbbade1bca6c
-
SHA256
308d21bb210e5f8496706e231ec4e6c8639eb3c95676fc244c8af0976ab4d39a
-
SHA512
0a20ab8e3717f97f37c8220947660c45fede5e20bca77a093d8d2dbad612d40fb7df0c26c79197532dcbfa4569fb82c4e24a6b124384ca655b905f37b24c5150
-
SSDEEP
1536:mISFfPIsPgfVjQWfXfUukY7WdKsW8SEKJOWaaTVH05UtlG4mP+lVrCjmxfZp1:mjPIsPgfVjQWfvU+idKsW8S/3HhHrPm2
Score
10/10
Malware Config
Signatures
-
Detect Mirai Payload 1 IoCs
resource yara_rule sample family_mirai -
Detected x86corona Mirai Variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Mirai family
-
Mirai_x86corona family
Files
-
308d21bb210e5f8496706e231ec4e6c8639eb3c95676fc244c8af0976ab4d39a.elf linux x86