Static task
static1
Behavioral task
behavioral1
Sample
362852c72f0752d78442831b57b90b6147655f3070db6ea77a76cff8117c367f
Resource
ubuntu1804-amd64-en-20211208
0 signatures
0 seconds
General
-
Target
362852c72f0752d78442831b57b90b6147655f3070db6ea77a76cff8117c367f
-
Size
54KB
-
MD5
7d3e195c532043ae785bbc99ce643409
-
SHA1
7230a5f8f76920242c8962912b216cda9f775d2b
-
SHA256
362852c72f0752d78442831b57b90b6147655f3070db6ea77a76cff8117c367f
-
SHA512
24a753c50c2ef1c311424d4b77c5894ea2c3e372c0baa9f5def9ff664e71ba32d3d611c37cf34db514664b309155c80b5f36d2a135e2c6c84c1314f4289d5a92
-
SSDEEP
768:jbCbHHctyjeeI6yz/8hfqW8TGRSCyUm+uqWvUK9HcwQfIi6yIt3KdxmKOvVT:vEHHcgo8AWLSem+uHUKifZ6yVd8XvVT
Score
10/10
Malware Config
Signatures
-
Detect Mirai Payload 1 IoCs
resource yara_rule sample family_mirai -
Detected x86corona Mirai Variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Mirai family
-
Mirai_x86corona family
Files
-
362852c72f0752d78442831b57b90b6147655f3070db6ea77a76cff8117c367f.elf linux x86