Static task
static1
Behavioral task
behavioral1
Sample
49db19eeb4ea82cc30e5811ec3ace5879718adf0f311111d5f25bed78c39f577
Resource
ubuntu1804-amd64-en-20211208
linux_amd64
0 signatures
0 seconds
General
-
Target
49db19eeb4ea82cc30e5811ec3ace5879718adf0f311111d5f25bed78c39f577
-
Size
70KB
-
MD5
31b9023bfa32685f4cc97a5588f7553f
-
SHA1
d654f007157c22e29f3a2f74d60fc74b12c6af30
-
SHA256
49db19eeb4ea82cc30e5811ec3ace5879718adf0f311111d5f25bed78c39f577
-
SHA512
44b8d6b1756246e90ad2723cbc55daab01f8d46409a0cce12a3767b436a3669f7ed9a5f7c48fc057c2957b8b1a1c7608840bbd6a0ef5259fcab281a60683b269
-
SSDEEP
1536:pmhWGQ8Muj7bdq0E68FWMeEGDC+mF+lVOCjUxfg71:qWGQ8MY7Zq0KQJlNmElVOCAxfg71
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
resource yara_rule sample family_mirai -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Mirai family
-
Mirai_x86corona family
Files
-
49db19eeb4ea82cc30e5811ec3ace5879718adf0f311111d5f25bed78c39f577.elf linux x86