Static task
static1
Behavioral task
behavioral1
Sample
2ea1319703b5a1dcdea0f8c841b17bcd2edec60b267d098e3f0a7f50055ba98c
Resource
ubuntu1804-amd64-en-20211208
0 signatures
0 seconds
General
-
Target
2ea1319703b5a1dcdea0f8c841b17bcd2edec60b267d098e3f0a7f50055ba98c
-
Size
70KB
-
MD5
29100a3c7902eb616827aa160f488f50
-
SHA1
a3b4a8d794309510a45b95a0e507b11337bd419b
-
SHA256
2ea1319703b5a1dcdea0f8c841b17bcd2edec60b267d098e3f0a7f50055ba98c
-
SHA512
72699f844d87b4adf63f0559491337e8ee9dc66d936a023c1592bf67d61721199014b71c9c2b959988756f3b67736cc51dc2c61f434fa6cdfdca7edccd10cc0d
-
SSDEEP
1536:/taBNxGAEV8+494o9nlmqe8ThfZ9iZOaa1md+lVOCjUxfg71:/tiOA4DeVplLFfzUOaa1mMlVOCAxfg71
Score
10/10
Malware Config
Signatures
-
Detect Mirai Payload 1 IoCs
resource yara_rule sample family_mirai -
Detected x86corona Mirai Variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Mirai family
-
Mirai_x86corona family
Files
-
2ea1319703b5a1dcdea0f8c841b17bcd2edec60b267d098e3f0a7f50055ba98c.elf linux x86