Static task
static1
Behavioral task
behavioral1
Sample
39959a48dba8d815968c17539e156f0d7f1b9a2aa389be2d57a57c6fd1a3c3f7
Resource
ubuntu1804-amd64-en-20211208
0 signatures
0 seconds
General
-
Target
39959a48dba8d815968c17539e156f0d7f1b9a2aa389be2d57a57c6fd1a3c3f7
-
Size
70KB
-
MD5
1f2d9a6d82fd145d6695bcf7483e7eb6
-
SHA1
b68ccd4248e82a83070b1615116ad60c44817ee4
-
SHA256
39959a48dba8d815968c17539e156f0d7f1b9a2aa389be2d57a57c6fd1a3c3f7
-
SHA512
9607c75748deb53584c0018fb189f88ae3a78ff31a8b910f5a63667781a2b858b6b4e7cb3eb92e3ca7d21990ff76f9e7e9939bd187e96eee32e77362e17e0796
-
SSDEEP
1536:+UaBNJG8EV8+494o9nlmqe8ThfZ9ipsphjGmd+lVOCjUxfg71:+Uiu84DeVplLFfzY0hjGmMlVOCAxfg71
Score
10/10
Malware Config
Signatures
-
Detect Mirai Payload 1 IoCs
resource yara_rule sample family_mirai -
Detected x86corona Mirai Variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Mirai family
-
Mirai_x86corona family
Files
-
39959a48dba8d815968c17539e156f0d7f1b9a2aa389be2d57a57c6fd1a3c3f7.elf linux x86