Static task
static1
Behavioral task
behavioral1
Sample
4cb4e53577ba2ca55737a0fd9d36178fb8df1a8ee847776bdca508d3bdf38698
Resource
ubuntu1804-amd64-en-20211208
linux_amd64
0 signatures
0 seconds
General
-
Target
4cb4e53577ba2ca55737a0fd9d36178fb8df1a8ee847776bdca508d3bdf38698
-
Size
71KB
-
MD5
6742bb7272ea95c66ca3ee000dd0a7c7
-
SHA1
18d8c084250f2e7c70afbe7fb994d5394954ef53
-
SHA256
4cb4e53577ba2ca55737a0fd9d36178fb8df1a8ee847776bdca508d3bdf38698
-
SHA512
19f5df1fbc700f3165c073e9ace85e45fb58f9742cd2daf6eecda507aea758bf527c0aa7302c30bc5fbaa4626bd7fff5f6dd7c10b938887f4543614c621183c7
-
SSDEEP
1536:R4Btnj67P53VjNWz4Bf81wuWIK9mLxp7mFxYkMP3RvEYmKq+0O7/wGfj+i:RAj67P53VjNWz4FuEV9mLxp7mF/MvRnF
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
resource yara_rule sample family_mirai -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Mirai family
-
Mirai_x86corona family
Files
-
4cb4e53577ba2ca55737a0fd9d36178fb8df1a8ee847776bdca508d3bdf38698.elf linux x86