Static task
static1
Behavioral task
behavioral1
Sample
358103c51b770b9f1669c6bb75990a7ec345ee91b8d5baa6e5239b20004774a5
Resource
ubuntu1804-amd64-en-20211208
linux_amd64
0 signatures
0 seconds
General
-
Target
358103c51b770b9f1669c6bb75990a7ec345ee91b8d5baa6e5239b20004774a5
-
Size
72KB
-
MD5
f7c73b78098993e70dc45171b27ea456
-
SHA1
d327ebfa2943efcde179ea080962b201ba8ab6b7
-
SHA256
358103c51b770b9f1669c6bb75990a7ec345ee91b8d5baa6e5239b20004774a5
-
SHA512
7fc60a8ea63b43521f61663bf596e2421a483ec0a2c705b71b782887210c4f1f873115d858787aafa8cdb3973d40614741d0acb58722bc01f1f4b782cc83bbf1
-
SSDEEP
1536:fTpaXgjEQ2HeEZ9I2jfvpmgYI+zZTcAbvywaFtaXGlUPSpw3m3EM+Y:fTpaXpQ2X9I2jfG9zZHbv+FAXGls1zM/
Score
10/10
Malware Config
Signatures
-
Detect Mirai Payload 1 IoCs
resource yara_rule sample family_mirai -
Detected x86corona Mirai Variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Mirai family
-
Mirai_x86corona family
Files
-
358103c51b770b9f1669c6bb75990a7ec345ee91b8d5baa6e5239b20004774a5.elf linux x86