Static task
static1
Behavioral task
behavioral1
Sample
a40095cfe000370a25512090d52952f167e886a101c70fd21daaded81f756a7b
Resource
ubuntu1804-amd64-en-20211208
linux_amd64
0 signatures
0 seconds
General
-
Target
a40095cfe000370a25512090d52952f167e886a101c70fd21daaded81f756a7b
-
Size
79KB
-
MD5
cb509e0b87b60ae2087a69d431a12902
-
SHA1
c091660e1c85e501a99119e947a7159aa23c77a9
-
SHA256
a40095cfe000370a25512090d52952f167e886a101c70fd21daaded81f756a7b
-
SHA512
f155ca2644ff2ead3193cff54d4281c4c0273ce3f3e1a57ab159352ac46de684ff9b051ffc1dc170ab1ef3a5a97e4f69500a3b638ae4b9c19a808ec98892e3ae
-
SSDEEP
1536:WkIhaFnRGt7g6jKFdRnmWjJcWLKT+1LGvswNeMmuI1VcaP04EfZR:2aFnSjjKFdFx+TCCvHm51VcaM4EfZR
Score
10/10
Malware Config
Signatures
-
Detect Mirai Payload 1 IoCs
resource yara_rule sample family_mirai -
Detected x86corona Mirai Variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Mirai family
-
Mirai_x86corona family
Files
-
a40095cfe000370a25512090d52952f167e886a101c70fd21daaded81f756a7b.elf linux x86