Static task
static1
Behavioral task
behavioral1
Sample
370712812355329d12ae1a07981c234405dfdee413c6ff3ff502c3b2ef3baf59
Resource
ubuntu1804-amd64-en-20211208
0 signatures
0 seconds
General
-
Target
370712812355329d12ae1a07981c234405dfdee413c6ff3ff502c3b2ef3baf59
-
Size
147KB
-
MD5
269ae9cb0ed6ddf5f26d543194e8e8ad
-
SHA1
c83cbe7a4378123e9f93c8211496b929d3ee467d
-
SHA256
370712812355329d12ae1a07981c234405dfdee413c6ff3ff502c3b2ef3baf59
-
SHA512
23b0b2f433d7a9935a26b4e63820b0c61c39679055cfdbeed279d5828168c3fa866c8aea90a574fc31542726d38d3542bd4a5c50f3d6b22c824d449620268b3f
-
SSDEEP
3072:EbhcV0vFZZxnA/UNQsJpmvSmywrntQL5RTAx5flANpTnO:Eb7tRA/UGsHmKDwrntQL5RTAx5flANpy
Score
10/10
Malware Config
Signatures
-
Detect Mirai Payload 1 IoCs
resource yara_rule sample family_mirai -
Detected x86corona Mirai Variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Detects Kaiten/Tsunami Payload 2 IoCs
resource yara_rule sample family_kaiten sample family_kaiten2 -
Kaiten family
-
Mirai family
-
Mirai_x86corona family
Files
-
370712812355329d12ae1a07981c234405dfdee413c6ff3ff502c3b2ef3baf59.elf linux x86