Static task
static1
Behavioral task
behavioral1
Sample
45cb60a68e8bbd504a87f9ff4c5d3902386bd77c2ba34ea38ac77cf8dd1b2d48
Resource
ubuntu1804-amd64-en-20211208
linux_amd64
0 signatures
0 seconds
General
-
Target
45cb60a68e8bbd504a87f9ff4c5d3902386bd77c2ba34ea38ac77cf8dd1b2d48
-
Size
78KB
-
MD5
08dd9038dfd56801ac4eec7426159e2a
-
SHA1
60598d85d949cbcfe9cfd5146b30937af58a2ced
-
SHA256
45cb60a68e8bbd504a87f9ff4c5d3902386bd77c2ba34ea38ac77cf8dd1b2d48
-
SHA512
fe748f2b317d3ac5177ce33046fc4569b5d73e551eda6569f13650f7ecb5f8f7396030bb70dbe0bd58b3497115f3b86577b23d674ac4ca502d11635046505cdd
-
SSDEEP
1536:RU0V/kwD921jCrZqc3OytkIOiszrWaFjKKlOARe66666jI5KlFktq3Nm3+lVrCje:S0lb921jCNqX6jORzrgKlzHIayEmOlVf
Score
10/10
Malware Config
Signatures
-
Detect Mirai Payload 1 IoCs
resource yara_rule sample family_mirai -
Detected x86corona Mirai Variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Mirai family
-
Mirai_x86corona family
Files
-
45cb60a68e8bbd504a87f9ff4c5d3902386bd77c2ba34ea38ac77cf8dd1b2d48.elf linux x86