Static task
static1
Behavioral task
behavioral1
Sample
39d037cd66980ed44a90d8bb66bb6ce09bbaccac390e915b7598020920cf4592
Resource
ubuntu1804-amd64-en-20211208
0 signatures
0 seconds
General
-
Target
39d037cd66980ed44a90d8bb66bb6ce09bbaccac390e915b7598020920cf4592
-
Size
75KB
-
MD5
16076d1f84777c7dba10a15ae4cf6dba
-
SHA1
49a6e02b9663dd6a19a02b5a07716a35b59db362
-
SHA256
39d037cd66980ed44a90d8bb66bb6ce09bbaccac390e915b7598020920cf4592
-
SHA512
ba16c2408d56fa88787c0f7fa977c87d678e325cc9bd08a4e7cf1a57cae3fd1e3994bd638c1f49f4b02b1682d65b1d5f89d4a156a977c4a53c7f143693ae188a
-
SSDEEP
1536:WLcJNK96ljW3oU3OmRzeQvAsZjXcBlUm/oYyke66Gm3XqhRRMFBf4Dc:WLUk96ljW3o7mRqQI6cBmK9j6GmnqhRg
Score
10/10
Malware Config
Signatures
-
Detect Mirai Payload 1 IoCs
resource yara_rule sample family_mirai -
Detected x86corona Mirai Variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Mirai family
-
Mirai_x86corona family
Files
-
39d037cd66980ed44a90d8bb66bb6ce09bbaccac390e915b7598020920cf4592.elf linux x86