Static task
static1
Behavioral task
behavioral1
Sample
a342b1c00a1d8926a32147d45f847307c4d532e1c87d04e3294aaed59805c6d5
Resource
ubuntu1804-amd64-en-20211208
linux_amd64
0 signatures
0 seconds
General
-
Target
a342b1c00a1d8926a32147d45f847307c4d532e1c87d04e3294aaed59805c6d5
-
Size
89KB
-
MD5
9d547e6503b6b7d5efcddf6dbf26ed49
-
SHA1
ea6afe5e6d74e2a8207f849fed44b4c5617ea5d4
-
SHA256
a342b1c00a1d8926a32147d45f847307c4d532e1c87d04e3294aaed59805c6d5
-
SHA512
b5aba96f6a4b204479c524c467e5aea3751cb94037703085b7e96a255c1f3195b51bb93d790e3df7593cf451af182e9ff3dbfcab8a91462d0c93690801643b43
-
SSDEEP
1536:L0oo94SRaTaLbSEx7KaUOM0dgdkWhLubG9z2ldVu5VjFbdDNhBuD/mIc0mgkNLz3:g79bRaTkJ5MagdkIubGBadVkbpLoD/Lk
Score
10/10
Malware Config
Signatures
-
Detect Mirai Payload 1 IoCs
resource yara_rule sample family_mirai -
Detected x86corona Mirai Variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Mirai family
-
Mirai_x86corona family
Files
-
a342b1c00a1d8926a32147d45f847307c4d532e1c87d04e3294aaed59805c6d5.elf linux x86