Static task
static1
Behavioral task
behavioral1
Sample
959289e7c69577c60440ba045a8c0a642c08f310c10ebbbec6fd58cdcbccae08
Resource
ubuntu1804-amd64-en-20211208
linux_amd64
0 signatures
0 seconds
General
-
Target
959289e7c69577c60440ba045a8c0a642c08f310c10ebbbec6fd58cdcbccae08
-
Size
70KB
-
MD5
721bba5420db69e7600524a5fa593165
-
SHA1
356ca69cab71caeb0aa76eeb5d18cf2c805a3a8c
-
SHA256
959289e7c69577c60440ba045a8c0a642c08f310c10ebbbec6fd58cdcbccae08
-
SHA512
4742133b284e842d36b4c2cfbf7221666f37f0084531be9326b8dafbbd8ba3b853cb7e4a1a4a0c3f45576959b319de7bc1603a7a7c4194e67e8f2b24cb6edbaa
-
SSDEEP
1536:/taBNxGAEV8+494o9nlmqe8ThfZ9ieSggmd+lVOCjUxfg71:/tiOA4DeVplLFfzTSggmMlVOCAxfg71
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
resource yara_rule sample family_mirai -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Mirai family
-
Mirai_x86corona family
Files
-
959289e7c69577c60440ba045a8c0a642c08f310c10ebbbec6fd58cdcbccae08.elf linux x86