Static task
static1
Behavioral task
behavioral1
Sample
5f6b65a372bfe982bca49e99f1ba17a57cbb5976a007bc07f1f645a2e9e6c22a
Resource
ubuntu1804-amd64-en-20211208
0 signatures
0 seconds
General
-
Target
5f6b65a372bfe982bca49e99f1ba17a57cbb5976a007bc07f1f645a2e9e6c22a
-
Size
2.3MB
-
MD5
05ba70eeccc4ed365a780417beb96d24
-
SHA1
bfaf56962d2e3b17f2b482979cb83bd4a6fd64f3
-
SHA256
5f6b65a372bfe982bca49e99f1ba17a57cbb5976a007bc07f1f645a2e9e6c22a
-
SHA512
1e27cfafc371de7d5231700dfd11b3e180a2f00c4fd09c60d73590697034d4912d06f6d35ce57e1226995981133341c7c3f96b4c373dc6118ed505019f696f31
-
SSDEEP
49152:3svqeeMdO3qV2afeyUPKppw3TNqdG7BPNwrnnbBzon1wj:3sU3qUJCppa18
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
resource yara_rule sample family_mirai -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Enemybot family
-
Mirai family
-
Mirai_x86corona family
-
family_enemybot 1 IoCs
EnemyBot payload
resource yara_rule sample family_enemybot
Files
-
5f6b65a372bfe982bca49e99f1ba17a57cbb5976a007bc07f1f645a2e9e6c22a.elf linux x86