Static task
static1
Behavioral task
behavioral1
Sample
3b8c2a7692b6efd015ad54d3d7694cfe2f219a4b831a11a9cb610cf45b2a82c7
Resource
ubuntu1804-amd64-en-20211208
0 signatures
0 seconds
General
-
Target
3b8c2a7692b6efd015ad54d3d7694cfe2f219a4b831a11a9cb610cf45b2a82c7
-
Size
156KB
-
MD5
55e7c8977fd3ee433aee7398ea0d7443
-
SHA1
6801bb24fd8151f58695ee15b69fffb4bf7a5163
-
SHA256
3b8c2a7692b6efd015ad54d3d7694cfe2f219a4b831a11a9cb610cf45b2a82c7
-
SHA512
b93c4c9492182b4478702ae1cffe296c0a72d46ed415da3929ae69a610e2a3c6725c66809225a452eb52e08fc52ea78988de0480e437e5babf462e9563f8241d
-
SSDEEP
3072:WBkUKqrtPjPo9+tu6oIGzxvlZGMZCY5T4k/2/PoZ:WBknUoV6oIG1vlZGMZCY5T4k/2/PoZ
Score
10/10
Malware Config
Signatures
-
Detect Mirai Payload 1 IoCs
resource yara_rule sample family_mirai -
Detected x86corona Mirai Variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Detects Kaiten/Tsunami Payload 1 IoCs
resource yara_rule sample family_kaiten2 -
Kaiten family
-
Mirai family
-
Mirai_x86corona family
Files
-
3b8c2a7692b6efd015ad54d3d7694cfe2f219a4b831a11a9cb610cf45b2a82c7.elf linux x86