Static task
static1
Behavioral task
behavioral1
Sample
4c80b5efe213e9d4808248f5585cad38c7b99a5461cee5f30d4b58768eb1ec13
Resource
ubuntu1804-amd64-en-20211208
linux_amd64
0 signatures
0 seconds
General
-
Target
4c80b5efe213e9d4808248f5585cad38c7b99a5461cee5f30d4b58768eb1ec13
-
Size
72KB
-
MD5
3bf891baee60654d57991d6682c7b00f
-
SHA1
c150e59f5313a9be3436672b0f2aa71587c85181
-
SHA256
4c80b5efe213e9d4808248f5585cad38c7b99a5461cee5f30d4b58768eb1ec13
-
SHA512
d71e2600938de91cac6e097c313290c8c19f084c02144e4c5bcd0f691613c1d4ee7a78181d659bec1c9bbdac3e44d06c44331c25861d04d072b45422a892ae89
-
SSDEEP
1536:veTcLGPwnVjAWnpdHTk4S3um7qasEGWqejpEKEGz2ctxomP+lVrCjmxfZp1:CcLGPwnVjAWnpxvS3um7hPzFE9+omWlJ
Score
10/10
Malware Config
Signatures
-
Detect Mirai Payload 1 IoCs
resource yara_rule sample family_mirai -
Detected x86corona Mirai Variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Mirai family
-
Mirai_x86corona family
Files
-
4c80b5efe213e9d4808248f5585cad38c7b99a5461cee5f30d4b58768eb1ec13.elf linux x86