Static task
static1
Behavioral task
behavioral1
Sample
30490b13c46c23b68b40a10c5923ddc8e09d6fb3195f8d973955a3f9add31cb5
Resource
ubuntu1804-amd64-en-20211208
0 signatures
0 seconds
General
-
Target
30490b13c46c23b68b40a10c5923ddc8e09d6fb3195f8d973955a3f9add31cb5
-
Size
78KB
-
MD5
ee5149837a56c4c71bbf4187b606cbaa
-
SHA1
06132e49c284c39747e1c4039100f7d601400bff
-
SHA256
30490b13c46c23b68b40a10c5923ddc8e09d6fb3195f8d973955a3f9add31cb5
-
SHA512
072e7793db1a197e173f8de4d98de891945bd0abc10346d6d68655668a3a414f7df67a71497b3753b7fefe1858546d9e9aa88a29351aac4fddbc46fcb36d44b1
-
SSDEEP
1536:Aobk9t5sPrPVj6WHC/DpFsksvKwwOEReg4BsKhWH88m66666Plm8E1V8zlimP+lJ:mt5sPrPVj6WHC/FivzwOEReh0cWlI7m2
Score
10/10
Malware Config
Signatures
-
Detect Mirai Payload 1 IoCs
resource yara_rule sample family_mirai -
Detected x86corona Mirai Variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Mirai family
-
Mirai_x86corona family
Files
-
30490b13c46c23b68b40a10c5923ddc8e09d6fb3195f8d973955a3f9add31cb5.elf linux x86