Static task
static1
Behavioral task
behavioral1
Sample
3051ebdb59d883e128e77902c0b7231635b9c6bca49033bb03336934252ee7fe
Resource
ubuntu1804-amd64-en-20211208
0 signatures
0 seconds
General
-
Target
3051ebdb59d883e128e77902c0b7231635b9c6bca49033bb03336934252ee7fe
-
Size
156KB
-
MD5
0458b14a8a4d616fbd1be2d2275bf105
-
SHA1
a84904aa3679e649a8e9006d04ecd527a041fe1c
-
SHA256
3051ebdb59d883e128e77902c0b7231635b9c6bca49033bb03336934252ee7fe
-
SHA512
2d518bd9311f2ee47e9098926f36a665d2160c697ef0bfbc66c421f1c0cb8503827360728b0595c7618b4420472437917aa000aacebb593787e95fe30ab1b185
-
SSDEEP
3072:WBkUlartPjPo9+tu66IsvNvlZGMZCY5T4k/2/PoZ:WBkgkoV66IsFvlZGMZCY5T4k/2/PoZ
Score
10/10
Malware Config
Signatures
-
Detect Mirai Payload 1 IoCs
resource yara_rule sample family_mirai -
Detected x86corona Mirai Variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Detects Kaiten/Tsunami Payload 1 IoCs
resource yara_rule sample family_kaiten2 -
Kaiten family
-
Mirai family
-
Mirai_x86corona family
Files
-
3051ebdb59d883e128e77902c0b7231635b9c6bca49033bb03336934252ee7fe.elf linux x86