Static task
static1
Behavioral task
behavioral1
Sample
fac6b20655fcbb3659a36b84c1c5773d045742817d7a9594b363c24f6536c24c
Resource
ubuntu1804-amd64-en-20211208
linux_amd64
0 signatures
0 seconds
General
-
Target
fac6b20655fcbb3659a36b84c1c5773d045742817d7a9594b363c24f6536c24c
-
Size
138KB
-
MD5
d440451f9c7557b72a3e294f949c3a58
-
SHA1
d3c00578c6ef0c79db21b3b69c31fd967b943cf1
-
SHA256
fac6b20655fcbb3659a36b84c1c5773d045742817d7a9594b363c24f6536c24c
-
SHA512
3667030e88168f7ce48964f22db9a04a6158ff533bd37b6a664fc53d9789f794012582bb489fe62c8063cc639aa337fb89abf484b477622410d25afafa70abdf
-
SSDEEP
3072:vj1MyLF+BObJGqZcdm25dAo6Y5CSTLsd/6H3+5+Ua5E4:vj1E6IqZc2o/5CSTLsd/6H3+5+Ua5E4
Score
10/10
Malware Config
Signatures
-
Detect Mirai Payload 1 IoCs
resource yara_rule sample family_mirai -
Detected x86corona Mirai Variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Mirai family
-
Mirai_x86corona family
Files
-
fac6b20655fcbb3659a36b84c1c5773d045742817d7a9594b363c24f6536c24c.elf linux x86