Static task
static1
Behavioral task
behavioral1
Sample
38c82ed0ad1ad98b7a4b3726166fb6b99711c41b6a91337de8db292bcf7fdafb
Resource
ubuntu1804-amd64-en-20211208
linux_amd64
0 signatures
0 seconds
General
-
Target
38c82ed0ad1ad98b7a4b3726166fb6b99711c41b6a91337de8db292bcf7fdafb
-
Size
75KB
-
MD5
4882c1b9cbffa4c0b4653cb66ea42326
-
SHA1
6a6a36d9017c3aeb796ece12abdda37969c6bf41
-
SHA256
38c82ed0ad1ad98b7a4b3726166fb6b99711c41b6a91337de8db292bcf7fdafb
-
SHA512
d111a81267a2e65318910ac7e6069827d99edc058905bb6a95ab9f87254d18b6163cb842408ea75d199312ce39fc18f97664c3bdc59e71d601fb48a3d2b5520b
-
SSDEEP
1536:6EnncuHO/K0idxRWcsFmGqWq8/VogulkIsmp+oVcujnxQZa1:MuHOCLdxRWcUbhtJPmgoVcujxQZa1
Score
10/10
Malware Config
Signatures
-
Detect Mirai Payload 1 IoCs
resource yara_rule sample family_mirai -
Detected x86corona Mirai Variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Mirai family
-
Mirai_x86corona family
Files
-
38c82ed0ad1ad98b7a4b3726166fb6b99711c41b6a91337de8db292bcf7fdafb.elf linux x86