Static task
static1
Behavioral task
behavioral1
Sample
b9c4db182f317055bfcdd509325687a1a59c7d37f43e09f678b0ad4990e990cc
Resource
ubuntu1804-amd64-en-20211208
0 signatures
0 seconds
General
-
Target
b9c4db182f317055bfcdd509325687a1a59c7d37f43e09f678b0ad4990e990cc
-
Size
67KB
-
MD5
7e9e35078f1eab9b2a1c641ee5d7154d
-
SHA1
50b687dcd0019a8e51d0411a89187bdc2517dc7a
-
SHA256
b9c4db182f317055bfcdd509325687a1a59c7d37f43e09f678b0ad4990e990cc
-
SHA512
90ffbead591e9f855a18a22120041eceef929ff98a584f035911e747f74ba78a36d2c59447ac515e2ae6ae1a212646f89a3b70cf8f9a28f9bcdbe9366726be37
-
SSDEEP
1536:5w8bIEmDIdV5LTepgWncXy9olDmF+l2OZ/fufYEZ:tbIEmDI1LeNcwYmEl2OZXufYEZ
Score
10/10
Malware Config
Signatures
-
Detect Mirai Payload 1 IoCs
resource yara_rule sample family_mirai -
Detected x86corona Mirai Variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Mirai family
-
Mirai_x86corona family
Files
-
b9c4db182f317055bfcdd509325687a1a59c7d37f43e09f678b0ad4990e990cc.elf linux x86