Static task
static1
General
-
Target
fx_unpack
-
Size
128KB
-
MD5
891928e9c2b78e9f73611efc22e1bde1
-
SHA1
f3fed580bfd40aaea551bb10dbb52bf29f2de616
-
SHA256
9cfc0d61c98aec746bde879a6150c87208c6256e664b854d9da77c7cfd6f6cc2
-
SHA512
fe714bba34a4e25febd6785a6c09ec0e67c0df4a768e6680ba6101963a832945669bf331b5c427bcecaa5fb0d3b2eb83d4d6f5590d065e669f2fa03586954844
-
SSDEEP
3072:2+80GYE1fan2ru0rY8SdVVLygnyRHIe2+0GU4piDdO1CZ/8mK6:hRrEoncRrYjPLBaRALMG/8mK6
Score
10/10
Malware Config
Signatures
-
Detect Mirai Payload 1 IoCs
resource yara_rule sample family_mirai -
Detected x86corona Mirai Variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Mirai family
-
Mirai is a prevalent Linux malware infecting exposed network devices 1 IoCs
Detected Mirai Linux malware
resource yara_rule sample elf_mirai_auto -
Mirai_x86corona family
Files
-
fx_unpack.elf linux x86