Static task
static1
Behavioral task
behavioral1
Sample
4a9d6e1358a432948a1c00ff9443437928d63884639af1f529f53be5cfea71dd
Resource
ubuntu1804-amd64-en-20211208
linux_amd64
0 signatures
0 seconds
General
-
Target
4a9d6e1358a432948a1c00ff9443437928d63884639af1f529f53be5cfea71dd
-
Size
109KB
-
MD5
548c09cf690a90aca4002b256deb55f0
-
SHA1
d956a633b8a613def7557fcc128af7cddc15dfde
-
SHA256
4a9d6e1358a432948a1c00ff9443437928d63884639af1f529f53be5cfea71dd
-
SHA512
9cae19e5715c2a46cc0038bd1262be200366419d51b966a12ba5ff9d5652755656c7c2ad75c9e20b883f28a07238a11759bb9721478e1a77af56e56e7fdb1d44
-
SSDEEP
3072:1g7IQXrQa0eTSG97CdhQ30nSmZ901XGXg9Px:1YIQJ1x97CdrnSmZ901XGXg9Px
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
resource yara_rule sample family_mirai -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Mirai family
-
Mirai_x86corona family
Files
-
4a9d6e1358a432948a1c00ff9443437928d63884639af1f529f53be5cfea71dd.elf linux x86