Static task
static1
Behavioral task
behavioral1
Sample
3d90dd3074404d5a087fa8b4d4bc7054260d095c3c1334eef93bd4d89243aae5
Resource
ubuntu1804-amd64-en-20211208
0 signatures
0 seconds
General
-
Target
3d90dd3074404d5a087fa8b4d4bc7054260d095c3c1334eef93bd4d89243aae5
-
Size
75KB
-
MD5
09aa182dd2ad1663a5a9e1ca1145290b
-
SHA1
cef5fc9485827e8279aea6b8e01c3e284cd5d587
-
SHA256
3d90dd3074404d5a087fa8b4d4bc7054260d095c3c1334eef93bd4d89243aae5
-
SHA512
a5e4fabf84ebfcfcdab5b4ae6e7fd25aa60737f9b72eb292bc6db3f3cbe9ad6cc134e7611d44f1ed09a2aeb6f184d2e48b45b180e68a575575664314626c8468
-
SSDEEP
1536:H6v3kjH2cs0q9pAgwxEWZQWWBKVLBgBc72md+oVcxjnxj5a1:RjH2PD9pAgwtKkL2mMoVcxjxj5a1
Score
10/10
Malware Config
Signatures
-
Detect Mirai Payload 1 IoCs
resource yara_rule sample family_mirai -
Detected x86corona Mirai Variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Mirai family
-
Mirai_x86corona family
Files
-
3d90dd3074404d5a087fa8b4d4bc7054260d095c3c1334eef93bd4d89243aae5.elf linux x86