Static task
static1
Behavioral task
behavioral1
Sample
386816c989890a71973f62f697d489dd89790cd1c610d402a9eb674e239553b1
Resource
ubuntu1804-amd64-en-20211208
0 signatures
0 seconds
General
-
Target
386816c989890a71973f62f697d489dd89790cd1c610d402a9eb674e239553b1
-
Size
89KB
-
MD5
2801ea43192cbd633fb4c875857de9ce
-
SHA1
59433e901806eea3c5d71e01797dea0b0da72a8b
-
SHA256
386816c989890a71973f62f697d489dd89790cd1c610d402a9eb674e239553b1
-
SHA512
c70ecfff52769a425865ecd8d7ef6f1098c0c4080a8538f871826cc14f3e3dfc1c6bba17705a01636b46261ea3e99bf4d8de048af784f3e2dda6e70bba080219
-
SSDEEP
1536:xNHhDvc53HGFcvjFjAU/KzE/KteFEIQxpt8/VZfw24rQq1EB6UTa9s0mrCiRVsJr:xnDvc5LJcYE5pG9ZnX6EUUsvF
Score
10/10
Malware Config
Signatures
-
Detect Mirai Payload 1 IoCs
resource yara_rule sample family_mirai -
Detected x86corona Mirai Variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Mirai family
-
Mirai_x86corona family
Files
-
386816c989890a71973f62f697d489dd89790cd1c610d402a9eb674e239553b1.elf linux x86