Static task
static1
Behavioral task
behavioral1
Sample
382627115e0fa2c61fa024a7142283579849d5203657ce4c7588f233a8184264
Resource
ubuntu1804-amd64-en-20211208
0 signatures
0 seconds
General
-
Target
382627115e0fa2c61fa024a7142283579849d5203657ce4c7588f233a8184264
-
Size
81KB
-
MD5
e31d00009e8c60a69547e3e5e09a286c
-
SHA1
ffaeb9c56ebaa08bff29640ef5c3655b96288200
-
SHA256
382627115e0fa2c61fa024a7142283579849d5203657ce4c7588f233a8184264
-
SHA512
c93d36e61781f2a430b4604284777f7b61c13a121df1f158c8aac57cc53f684c6b829d60657480223299dc6151370d141d1759c3f0f55cc4a584e5a5178444fb
-
SSDEEP
1536:YS8hUE1XrbaG3WPId7R0B2B9eAIv5v5F2Iw48YmEfiQeM6h3skYoafLrGPVu:YS8hUojWPc7R0BYBIRaIwtmFl6dskYoK
Score
10/10
Malware Config
Signatures
-
Detect Mirai Payload 1 IoCs
resource yara_rule sample family_mirai -
Detected x86corona Mirai Variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Detects Kaiten/Tsunami Payload 1 IoCs
resource yara_rule sample family_kaiten2 -
Kaiten family
-
Mirai family
-
Mirai_x86corona family
Files
-
382627115e0fa2c61fa024a7142283579849d5203657ce4c7588f233a8184264.elf linux x86