Static task
static1
Behavioral task
behavioral1
Sample
36898b88a403813f4c2c81cae6f84c3126d41ec099a5938d56d3abdb43fcb50d
Resource
ubuntu1804-amd64-en-20211208
linux_amd64
0 signatures
0 seconds
General
-
Target
36898b88a403813f4c2c81cae6f84c3126d41ec099a5938d56d3abdb43fcb50d
-
Size
98KB
-
MD5
44ccfbef3ae3207cdfeae42d7e395227
-
SHA1
e6db412028b1dc94dd7667d3fc1cc0733381739f
-
SHA256
36898b88a403813f4c2c81cae6f84c3126d41ec099a5938d56d3abdb43fcb50d
-
SHA512
89c9be467c9b25c2de91cfeb232c7a3355c168c655bc5d3c79df78964e7e437b53c614bb38d4474a7a6eb01ca3e715f7340da5cbf42a99cdbb72326d84587df6
-
SSDEEP
3072:DUB3vJE6SBV97XsXd4x3JWcq6hmBmSK0nMPZgVX9:AJXSFUd4dkcPmBmSK0nMPZgVX9
Score
10/10
Malware Config
Signatures
-
Detect Mirai Payload 1 IoCs
resource yara_rule sample family_mirai -
Detected x86corona Mirai Variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Mirai family
-
Mirai_x86corona family
Files
-
36898b88a403813f4c2c81cae6f84c3126d41ec099a5938d56d3abdb43fcb50d.elf linux x86