Static task
static1
Behavioral task
behavioral1
Sample
3a78bb0c65890c71cbde0233dfd0e17b2cb5744311374ac220f2a300deeb32e9
Resource
ubuntu1804-amd64-en-20211208
0 signatures
0 seconds
General
-
Target
3a78bb0c65890c71cbde0233dfd0e17b2cb5744311374ac220f2a300deeb32e9
-
Size
72KB
-
MD5
f4ec3ea6458aacfcef792c4f39fc4f64
-
SHA1
6d2175381cf15da46586a44533830179cc0bc918
-
SHA256
3a78bb0c65890c71cbde0233dfd0e17b2cb5744311374ac220f2a300deeb32e9
-
SHA512
4c25a4e23e491121d035ae0a3bdbe8450861213b12b8860a9359553cb0dc17d43f366a0ff70155c3318f16199eb7db70f64f1a4ebee53c538cfbbe55a69a949d
-
SSDEEP
1536:rCTcfGPwnVjAWngclzLk4S3um7qasEGWqejFEKEGz2ctxomP+lVrCjmxfZp1:CcfGPwnVjAWngcFHS3um7hPzBE9+omW7
Score
10/10
Malware Config
Signatures
-
Detect Mirai Payload 1 IoCs
resource yara_rule sample family_mirai -
Detected x86corona Mirai Variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Mirai family
-
Mirai_x86corona family
Files
-
3a78bb0c65890c71cbde0233dfd0e17b2cb5744311374ac220f2a300deeb32e9.elf linux x86