Static task
static1
Behavioral task
behavioral1
Sample
849fbf6e9fe3c6ec8a8428cde3e6ebed24de94fe8c530a4d83f95f0051f7765d
Resource
ubuntu1804-amd64-en-20211208
linux_amd64
0 signatures
0 seconds
General
-
Target
849fbf6e9fe3c6ec8a8428cde3e6ebed24de94fe8c530a4d83f95f0051f7765d
-
Size
117KB
-
MD5
1b9400b1485236381c6766f453fef262
-
SHA1
18ae2e32b77b3ebd46bb3920aa7ba0e798be0d02
-
SHA256
849fbf6e9fe3c6ec8a8428cde3e6ebed24de94fe8c530a4d83f95f0051f7765d
-
SHA512
e7986811bc7a7c70c4ad5a139b410bd7dc653e0694cdb12ca2b73ea01e8b13ce5b981fac6a457e10d7578d2a8505dbd5c5bb48be2cd3c24ade37032a07b19520
-
SSDEEP
3072:8/DxplJdXvP5VqDUP3UsqiCLFAMLln3p8rg+Z0Ua3hgp6W:GDxp5vWPiC5Px3mrg+Z0Ua3hgp6W
Score
10/10
Malware Config
Signatures
-
Detect Mirai Payload 1 IoCs
resource yara_rule sample family_mirai -
Detected x86corona Mirai Variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Mirai family
-
Mirai_x86corona family
Files
-
849fbf6e9fe3c6ec8a8428cde3e6ebed24de94fe8c530a4d83f95f0051f7765d.elf linux x86