Static task
static1
Behavioral task
behavioral1
Sample
471e5d74c4081975827eeaa03abf409323d57015c6b60d348abfa07b6d41d9b0
Resource
ubuntu1804-amd64-en-20211208
linux_amd64
0 signatures
0 seconds
General
-
Target
471e5d74c4081975827eeaa03abf409323d57015c6b60d348abfa07b6d41d9b0
-
Size
98KB
-
MD5
68372230a045401869186c86572a7e76
-
SHA1
4475f7227dd1597d3dfa7d534870020a9a540ea2
-
SHA256
471e5d74c4081975827eeaa03abf409323d57015c6b60d348abfa07b6d41d9b0
-
SHA512
31054838f86598b9c6a8274839265462e95f8171d8399e1c6390f5f6b23f49f4dc8d782691b92a00322ea01b82c1203bc4f0e57a7310406719436163a4ab01aa
-
SSDEEP
3072:AV2EouY3Un+WDOno6Wigq+WYMGABmSK0nMPZg4X9:puWUtfPi5jGABmSK0nMPZg4X9
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
resource yara_rule sample family_mirai -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Mirai family
-
Mirai_x86corona family
Files
-
471e5d74c4081975827eeaa03abf409323d57015c6b60d348abfa07b6d41d9b0.elf linux x86