Static task
static1
Behavioral task
behavioral1
Sample
961e3c87a35aab15a4cdcdeec7c709eddd271427f1218807a7fa4dcaddf052fd
Resource
ubuntu1804-amd64-en-20211208
linux_amd64
0 signatures
0 seconds
General
-
Target
961e3c87a35aab15a4cdcdeec7c709eddd271427f1218807a7fa4dcaddf052fd
-
Size
71KB
-
MD5
c9c4e203c7903c55d4cb93b9b8fadd81
-
SHA1
1c383c00f42e1e1efbf54761411ea1d70727cb46
-
SHA256
961e3c87a35aab15a4cdcdeec7c709eddd271427f1218807a7fa4dcaddf052fd
-
SHA512
78df37cd8f468b07af3ec0541f20244ac74b9d41cde05d69556993c5b34c09e3c33ee5ca61b6a544cf33b205c84ac546bcb47643293fdb699cd2b0e124ef9cff
-
SSDEEP
1536:dYMS9UJjJsF57LJ83I4+HCin8tyqH8AKOS+3FaiKm3+lVOtjUxfAE1:dYD9UJjJKhLsI9Hv3qH13S+VaiKmOlVb
Score
10/10
Malware Config
Signatures
-
Detect Mirai Payload 1 IoCs
resource yara_rule sample family_mirai -
Detected x86corona Mirai Variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Mirai family
-
Mirai_x86corona family
Files
-
961e3c87a35aab15a4cdcdeec7c709eddd271427f1218807a7fa4dcaddf052fd.elf linux x86