Static task
static1
Behavioral task
behavioral1
Sample
2f6a23b17cb09481924fc6603b634d72a25b6b79d1d508735f9c2a12e5df46d3
Resource
ubuntu1804-amd64-en-20211208
0 signatures
0 seconds
General
-
Target
2f6a23b17cb09481924fc6603b634d72a25b6b79d1d508735f9c2a12e5df46d3
-
Size
72KB
-
MD5
53564664ae55f29371efbedb67f45dc0
-
SHA1
a3aec2ae83631a0c326c641bfa4cbffa4cea6eab
-
SHA256
2f6a23b17cb09481924fc6603b634d72a25b6b79d1d508735f9c2a12e5df46d3
-
SHA512
417b5b7f139de490aa3be1ad7e735f73e7be1865a48f0e54fab7ab3ab05b4574965e8b0fed71808d6beb5d7732ccd493c89c259bab4197d3afbb2a142b03ac55
-
SSDEEP
1536:qpTcVGPwnVjAWnpvdTk4S3um7qasEGWqejXEKEGz2ctxomP+lVrCjmxfZp1:8cVGPwnVjAWnpFvS3um7hPzjE9+omWlJ
Score
10/10
Malware Config
Signatures
-
Detect Mirai Payload 1 IoCs
resource yara_rule sample family_mirai -
Detected x86corona Mirai Variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Mirai family
-
Mirai_x86corona family
Files
-
2f6a23b17cb09481924fc6603b634d72a25b6b79d1d508735f9c2a12e5df46d3.elf linux x86