Static task
static1
Behavioral task
behavioral1
Sample
4311f6b20375ef95f506505d00a3a923746d0e3e457be513599f5e12fc839ee3
Resource
ubuntu1804-amd64-en-20211208
linux_amd64
0 signatures
0 seconds
General
-
Target
4311f6b20375ef95f506505d00a3a923746d0e3e457be513599f5e12fc839ee3
-
Size
82KB
-
MD5
dc671887f6257e2e7309147350ad1fdc
-
SHA1
790a04d6b4a7dae46c86e9996c3739188cd2c892
-
SHA256
4311f6b20375ef95f506505d00a3a923746d0e3e457be513599f5e12fc839ee3
-
SHA512
9a527ab93e770a431df3c809a20058f989980684c6f72cb7b52936491eaee9fae07b700e4d430e2f4ec2394c4a649a077e0067f75a86e3b2aee802d27a70370a
-
SSDEEP
1536:Zsoyt4rTV6A42xdvSBaCI4SPm5Z5F4M8XxWZtMatUtcZROG6gyqc:Zseg92jSB5IVP0aM8kZtx2tcZkG6gyqc
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
resource yara_rule sample family_mirai -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Mirai family
-
Mirai_x86corona family
Files
-
4311f6b20375ef95f506505d00a3a923746d0e3e457be513599f5e12fc839ee3.elf linux x86