Static task
static1
Behavioral task
behavioral1
Sample
3700e4943da77844e9243eff759a2f09736d9c05b7d718d0fe8f0f9258a361e2
Resource
ubuntu1804-amd64-en-20211208
0 signatures
0 seconds
General
-
Target
3700e4943da77844e9243eff759a2f09736d9c05b7d718d0fe8f0f9258a361e2
-
Size
113KB
-
MD5
b6d4096517717737b3264b8c31a7583a
-
SHA1
66f5a6e841381a0920f0e0f8b21ce293ea8e1b9b
-
SHA256
3700e4943da77844e9243eff759a2f09736d9c05b7d718d0fe8f0f9258a361e2
-
SHA512
a03ab54c04ded7f725353d5e215c7ae7c5269cef63396e2f99f9aba860bfeb1243c0450b98916abc631adfdd7c193f393b55f95a25c738e35beb691034cac576
-
SSDEEP
3072:Q7Lla/zS8QUGz1Xaxntk/TBM5RA1t+Z0Ua3hgp6W:j/zS8dg0jGTBWRst+Z0Ua3hgp6W
Score
10/10
Malware Config
Signatures
-
Detect Mirai Payload 1 IoCs
resource yara_rule sample family_mirai -
Detected x86corona Mirai Variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Mirai family
-
Mirai_x86corona family
Files
-
3700e4943da77844e9243eff759a2f09736d9c05b7d718d0fe8f0f9258a361e2.elf linux x86