Static task
static1
Behavioral task
behavioral1
Sample
e8ba821305ab0dba4b1a4efb3073b35db8d3ea7ec47a072c1966d1462f8070f9
Resource
ubuntu1804-amd64-en-20211208
linux_amd64
0 signatures
0 seconds
General
-
Target
e8ba821305ab0dba4b1a4efb3073b35db8d3ea7ec47a072c1966d1462f8070f9
-
Size
96KB
-
MD5
0262623d7565e8a9ad5cdf31da88b966
-
SHA1
eb020e711a0e5374a658bb7c247b2fbca101e55b
-
SHA256
e8ba821305ab0dba4b1a4efb3073b35db8d3ea7ec47a072c1966d1462f8070f9
-
SHA512
f6ddca4636b42e2961376b766c8f2903161059174a564fce9d3089872def339eb03c26eebb31e4e23dab817bd9ee27e17b024a2daffc12cd19c412750cf15f5c
-
SSDEEP
3072:rMzGU4AKwq8cP+pO0h2hN5dyo4QCokIg8zcCLu:rMzGYW1tRhN5dp4QCokIg8zcCLu
Score
10/10
Malware Config
Signatures
-
Detect Mirai Payload 1 IoCs
resource yara_rule sample family_mirai -
Detected x86corona Mirai Variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Detects Kaiten/Tsunami Payload 1 IoCs
resource yara_rule sample family_kaiten2 -
Kaiten family
-
Mirai family
-
Mirai_x86corona family
Files
-
e8ba821305ab0dba4b1a4efb3073b35db8d3ea7ec47a072c1966d1462f8070f9.elf linux x86