Static task
static1
Behavioral task
behavioral1
Sample
10c9584c6a532f2b648fb5689b92292d5ab54131e214b93487a12c275d625c8e
Resource
ubuntu1804-amd64-en-20211208
linux_amd64
0 signatures
0 seconds
General
-
Target
10c9584c6a532f2b648fb5689b92292d5ab54131e214b93487a12c275d625c8e
-
Size
94KB
-
MD5
7356018e4a5e0945a4428d58cefd1647
-
SHA1
fc2685f775a4d7a1798c18c62791439d19d6abf7
-
SHA256
10c9584c6a532f2b648fb5689b92292d5ab54131e214b93487a12c275d625c8e
-
SHA512
402f58adac148e5dcc4145392d50a57a492df280dab9c38b1d8aefa8ae1907360b54a40b767b401d3dcbf54369c5c5ce81b9aa9f57b816327faeea733d784a71
-
SSDEEP
1536:msqmQTbw7U+OU0Cf5UI8E8WwP6kHzgk81VwcG2embGMUNLe5um7WAgcVjmZIcBI:msi2UVUtBUI8GwPfHkk8rheLesmqAgcr
Score
10/10
Malware Config
Signatures
-
Detect Mirai Payload 1 IoCs
resource yara_rule sample family_mirai -
Detected x86corona Mirai Variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Mirai family
-
Mirai_x86corona family
Files
-
10c9584c6a532f2b648fb5689b92292d5ab54131e214b93487a12c275d625c8e.elf linux x86