Static task
static1
Behavioral task
behavioral1
Sample
13aff2e0feed6fc3479b4abf44705faf58e66608c7b90aa6d5ec3211b6fecf90
Resource
ubuntu1804-amd64-en-20211208
linux_amd64
0 signatures
0 seconds
General
-
Target
13aff2e0feed6fc3479b4abf44705faf58e66608c7b90aa6d5ec3211b6fecf90
-
Size
79KB
-
MD5
4cbdb894089a9690be396ab1103ce8f9
-
SHA1
1ae2e8df69a2955ceb47b8abc3bc0ec159155ea6
-
SHA256
13aff2e0feed6fc3479b4abf44705faf58e66608c7b90aa6d5ec3211b6fecf90
-
SHA512
40245f4e6595289a21cd9d32296288001c3a135b8c6edba6c0431ce9449299de859a4a93df426884d5e9146291ece2d95cec005260c3d8940997eab2d78e4de6
-
SSDEEP
1536:LgJ24x98xjovgMqnU7f3SPM5Kdy5vRElZTh/LoP9mdInVONj8xsqDM:Lgo+98xjopr7fSkD5v6TTh/Lo1munVOB
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
resource yara_rule sample family_mirai -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Mirai family
-
Mirai_x86corona family
Files
-
13aff2e0feed6fc3479b4abf44705faf58e66608c7b90aa6d5ec3211b6fecf90.elf linux x86