Static task
static1
Behavioral task
behavioral1
Sample
3b3b6c4a1b0dc941991f2a258a67a6ffd96735ea583b4710d65e50c4c4b29364
Resource
ubuntu1804-amd64-en-20211208
0 signatures
0 seconds
General
-
Target
3b3b6c4a1b0dc941991f2a258a67a6ffd96735ea583b4710d65e50c4c4b29364
-
Size
72KB
-
MD5
16100bc00b92fb167c70968f6fdd9f9c
-
SHA1
402136139e6e4b2620c179ecc1c67d5862f4e9dd
-
SHA256
3b3b6c4a1b0dc941991f2a258a67a6ffd96735ea583b4710d65e50c4c4b29364
-
SHA512
3c5881247c7abbd76754e6e01a961441aa89b721a323cca9068212eab52de4f1a60b4290ac506f2ae64d8a3e7d97ad65fceff281a0f6670901fddd3883616e53
-
SSDEEP
1536:JegsPuAVnwLcrBEHj24uxBBVuaAjEzaN2tXUM2O13v14ahgnrXr/ms9:J8uJQrBSi4ux3UaYb2tXHvWahgnzr/m6
Score
10/10
Malware Config
Signatures
-
Detect Mirai Payload 1 IoCs
resource yara_rule sample family_mirai -
Detected x86corona Mirai Variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Mirai family
-
Mirai_x86corona family
Files
-
3b3b6c4a1b0dc941991f2a258a67a6ffd96735ea583b4710d65e50c4c4b29364.elf linux x86