Static task
static1
Behavioral task
behavioral1
Sample
b6c8ee602f439f4ec1012c2cbc4b9eae73b234ac5d4982fc0128712492e8909e
Resource
ubuntu1804-amd64-en-20211208
0 signatures
0 seconds
General
-
Target
b6c8ee602f439f4ec1012c2cbc4b9eae73b234ac5d4982fc0128712492e8909e
-
Size
74KB
-
MD5
a3c2290478472c99b59218ad355ed949
-
SHA1
21668ac23fc72005a7b158da844378aaa49e5c17
-
SHA256
b6c8ee602f439f4ec1012c2cbc4b9eae73b234ac5d4982fc0128712492e8909e
-
SHA512
3447cc2847f73fbe98dcb3374d323654094b86f2757e6aa2a61a1ac152db2880af56c92580d76ffb840507f2f05d331ff7d74940e22079cff5551e3a6a818242
-
SSDEEP
1536:E+tin6BzISu1iW4MFsj6hhfh9GlG1QENmjspPxBXk3tPO568m:E+tIDFsehhp9Z1QEQgppBXk3ZO568m
Score
10/10
Malware Config
Signatures
-
Detect Mirai Payload 1 IoCs
resource yara_rule sample family_mirai -
Detected x86corona Mirai Variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Detects Kaiten/Tsunami Payload 2 IoCs
resource yara_rule sample family_kaiten sample family_kaiten2 -
Kaiten family
-
Mirai family
-
Mirai_x86corona family
Files
-
b6c8ee602f439f4ec1012c2cbc4b9eae73b234ac5d4982fc0128712492e8909e.elf linux x86