Static task
static1
Behavioral task
behavioral1
Sample
420ef848e332938cc08fec82558b7c5b4c6ee45d0bf948e19192b47288b0dec1
Resource
ubuntu1804-amd64-en-20211208
linux_amd64
0 signatures
0 seconds
General
-
Target
420ef848e332938cc08fec82558b7c5b4c6ee45d0bf948e19192b47288b0dec1
-
Size
72KB
-
MD5
7793f0c995db96b36aa5ef1d7f49af44
-
SHA1
5d925beffd77862f408081f41dfd187c3c573e34
-
SHA256
420ef848e332938cc08fec82558b7c5b4c6ee45d0bf948e19192b47288b0dec1
-
SHA512
8cb31304376ab4e3aff403d0ae5276093885670246c90184505b439ce480287ded5c3c104a054bfd6d1008a3ed6372190874f5e97c5e4a95425946c688ebc478
-
SSDEEP
1536:qpTcVGPwnVjAWnpvdTk4S3um7qasEGWqejvEKEGz2ctxomP+lVrCjmxfZp1:8cVGPwnVjAWnpFvS3um7hPz7E9+omWlJ
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
resource yara_rule sample family_mirai -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Mirai family
-
Mirai_x86corona family
Files
-
420ef848e332938cc08fec82558b7c5b4c6ee45d0bf948e19192b47288b0dec1.elf linux x86