Static task
static1
Behavioral task
behavioral1
Sample
5cebe0eac14143be5fb8aace0b29d9257254f8c38dcb150e111ae1d8088d094f
Resource
ubuntu1804-amd64-en-20211208
linux_amd64
0 signatures
0 seconds
General
-
Target
5cebe0eac14143be5fb8aace0b29d9257254f8c38dcb150e111ae1d8088d094f
-
Size
84KB
-
MD5
af0979daac75c59ba81fe4483308136f
-
SHA1
cfc1b32fdeb2b8ab823e15ff2ed99cf016476ed0
-
SHA256
5cebe0eac14143be5fb8aace0b29d9257254f8c38dcb150e111ae1d8088d094f
-
SHA512
4eb230e1eef736afb9865229a41d9fd4e1c0a668480e7a61a250c745cb25a98d53a001a7faa5fd673fabe9c1d81b3c05bb213eaedb75fb9a35b07dfee585d3d9
-
SSDEEP
1536:UUhJ4xYqSXv+xWrMhxwCZKl9jaJqwUuwcQkm7WAgcJjmAI7Hp:z4xYqSXRQhxwCZ6kXlmqAgcJyAI7Hp
Score
10/10
Malware Config
Signatures
-
Detect Mirai Payload 1 IoCs
resource yara_rule sample family_mirai -
Detected x86corona Mirai Variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Mirai family
-
Mirai_x86corona family
Files
-
5cebe0eac14143be5fb8aace0b29d9257254f8c38dcb150e111ae1d8088d094f.elf linux x86