Static task
static1
Behavioral task
behavioral1
Sample
4a14b538e551d4af2045ebebdeaccc53537f832faaedaf361a3c4de13a057f6b
Resource
ubuntu1804-amd64-en-20211208
0 signatures
0 seconds
General
-
Target
4a14b538e551d4af2045ebebdeaccc53537f832faaedaf361a3c4de13a057f6b
-
Size
54KB
-
MD5
55529bfe1f1b0fd5d8dd7c207da9a517
-
SHA1
357cbb2afd27c392c2af823e7ef11da188cfdf29
-
SHA256
4a14b538e551d4af2045ebebdeaccc53537f832faaedaf361a3c4de13a057f6b
-
SHA512
913a42efeb9c256f8c84a511feab16efbc8ed26210baf0ac4a5a1af4a71d862c308f3b5e268097ef75d728c81865267e5549a352d41520d9118e2b2dafb5eeff
-
SSDEEP
1536:YCYPkwAMnwWvgejy3mDvM/s/QU2hWDdJd/:YCDwZ9oee3mDEgD2hm
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
Processes:
resource yara_rule sample family_mirai -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
Processes:
resource yara_rule sample family_mirai_x86corona -
Mirai family
-
Mirai_x86corona family
Files
-
4a14b538e551d4af2045ebebdeaccc53537f832faaedaf361a3c4de13a057f6b.elf linux x86