Static task
static1
Behavioral task
behavioral1
Sample
4a58dde2932cb765d63347223f6b0070adabec399301a2ca7df584c3be4fb1cd
Resource
ubuntu1804-amd64-en-20211208
linux_amd64
0 signatures
0 seconds
General
-
Target
4a58dde2932cb765d63347223f6b0070adabec399301a2ca7df584c3be4fb1cd
-
Size
71KB
-
MD5
452b958409107844d8fe1b496c416d8f
-
SHA1
50efa623d974730f4163b4d30b649afce16b2b72
-
SHA256
4a58dde2932cb765d63347223f6b0070adabec399301a2ca7df584c3be4fb1cd
-
SHA512
2f6ca6d121bedda9435981fcd3290871ed197516499412ca9579b088358bf8d0200b73b236cdc8a3ff2780c3191370308ccdce4dcd8cec11c4c61c920c958b3d
-
SSDEEP
1536:Pp53FL0Ecmm1IWM0yBNwWEUrK7QHxIaHdLrdB4ohmZ+LVO049unnuY:Pp9FpcmmIWMZvwZU9HxP9L5JhmQLVO0d
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
resource yara_rule sample family_mirai -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Mirai family
-
Mirai_x86corona family
Files
-
4a58dde2932cb765d63347223f6b0070adabec399301a2ca7df584c3be4fb1cd.elf linux x86