Static task
static1
Behavioral task
behavioral1
Sample
e5575f1a8f4a3a2ae6a5678bc7bc058bf591b69a32fcdc392111de2b5325a095
Resource
ubuntu1804-amd64-en-20211208
linux_amd64
0 signatures
0 seconds
General
-
Target
e5575f1a8f4a3a2ae6a5678bc7bc058bf591b69a32fcdc392111de2b5325a095
-
Size
85KB
-
MD5
a754d5108eec2317c26db8e7145a869d
-
SHA1
8014bb1e88858d28b23c80e0a4e8dc152b7d2641
-
SHA256
e5575f1a8f4a3a2ae6a5678bc7bc058bf591b69a32fcdc392111de2b5325a095
-
SHA512
ee03507339c5b29bc0a5f9d38326d3237162294aa6e4a9f5f5db1cdcb07be488cb22e9b1ddf424315ce6ae9b0e1035eba198e1471aa620100acb0b318c6a3337
-
SSDEEP
1536:CA1dUL9jOWswudVchqXV0uHMfuFDwBLgMGN1gnPwJUkit1O5u1m:CfNudV4qlbsaw5gMc1gn4JUkiXO5u1m
Score
10/10
Malware Config
Signatures
-
Detect Mirai Payload 1 IoCs
resource yara_rule sample family_mirai -
Detected x86corona Mirai Variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Detects Kaiten/Tsunami Payload 2 IoCs
resource yara_rule sample family_kaiten sample family_kaiten2 -
Kaiten family
-
Mirai family
-
Mirai_x86corona family
Files
-
e5575f1a8f4a3a2ae6a5678bc7bc058bf591b69a32fcdc392111de2b5325a095.elf linux x86