Static task
static1
Behavioral task
behavioral1
Sample
39506e0b7169f4da8ffa5970d599d1f11871e9f1914ae148b0be1b165aee7f0b
Resource
ubuntu1804-amd64-en-20211208
0 signatures
0 seconds
General
-
Target
39506e0b7169f4da8ffa5970d599d1f11871e9f1914ae148b0be1b165aee7f0b
-
Size
87KB
-
MD5
f7ee398de04571dfda89fb22350e7df0
-
SHA1
7dce6814c200b23f2aa704f81e510d61cc8e2a7f
-
SHA256
39506e0b7169f4da8ffa5970d599d1f11871e9f1914ae148b0be1b165aee7f0b
-
SHA512
7992020e96a6977897743bf6d4f16bb1984e9b88f3eaa469d4686c1e4dda51e425fdea1a3a1969c8ddd65b0e8d194d20c6822c6a4d10b1ea595ea343df7c3144
-
SSDEEP
1536:pSeQ78xfyi86Xml89Tvnfhd0hsQTkJluFkw5L5SPsLOnPGJUkft3LR52wm:pSwxTWWdvnJdapAJjwx5csLOnOJUkfxq
Score
10/10
Malware Config
Signatures
-
Detect Mirai Payload 1 IoCs
resource yara_rule sample family_mirai -
Detected x86corona Mirai Variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Detects Kaiten/Tsunami Payload 2 IoCs
resource yara_rule sample family_kaiten sample family_kaiten2 -
Kaiten family
-
Mirai family
-
Mirai_x86corona family
Files
-
39506e0b7169f4da8ffa5970d599d1f11871e9f1914ae148b0be1b165aee7f0b.elf linux x86