Static task
static1
Behavioral task
behavioral1
Sample
440c87acaa782ce9694e5dfb9ea03ed25903422804fbeed6a357688b9749b24d
Resource
ubuntu1804-amd64-en-20211208
linux_amd64
0 signatures
0 seconds
General
-
Target
440c87acaa782ce9694e5dfb9ea03ed25903422804fbeed6a357688b9749b24d
-
Size
122KB
-
MD5
acc4b55ca725237ea642a44a96778cc5
-
SHA1
1ed6dfeabf7f8b57182577db40ed33d8b24280e5
-
SHA256
440c87acaa782ce9694e5dfb9ea03ed25903422804fbeed6a357688b9749b24d
-
SHA512
03855c52b5c71e3b9d2c10eb907e421b66926caffb7139768d4f65836a5ac19c891cecafe26ca5bc1b0921cf083d120ee4236cf8eb586de7934b9f33cb95e283
-
SSDEEP
3072:JmRcYwWSN4u4vlU3NSqetJ8add9QzTsNzn0t4NKcXeG2GK:JgZcEi9SqetJ8addQ+0t4NKcXd2GK
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
resource yara_rule sample family_mirai -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Mirai family
-
Mirai_x86corona family
Files
-
440c87acaa782ce9694e5dfb9ea03ed25903422804fbeed6a357688b9749b24d.elf linux x86