Behavioral task
behavioral1
Sample
525b0c030e12b76af5556393de3e63a771ae8697f90e2560b0217879ee851247
Resource
ubuntu1804-amd64-en-20211208
ubuntu-18.04-amd64
0 signatures
150 seconds
General
-
Target
525b0c030e12b76af5556393de3e63a771ae8697f90e2560b0217879ee851247
-
Size
117KB
-
MD5
a5da26f523209efff0f1f354e0382121
-
SHA1
486c64a9f1a5af9f467b3e8dbe71e336425ea409
-
SHA256
525b0c030e12b76af5556393de3e63a771ae8697f90e2560b0217879ee851247
-
SHA512
060eb9abeda55d14e79034091d75667b05ab7d0c354d7972b925c78c31329ef4237c06fa53b47519e0cad2b8fd4a54a5c44ead79fd1b78dfd1fd5873b46c199d
-
SSDEEP
3072:VR9D575zPQ2fWxb0GQGfl4ckclFb91g+Z0Ua3hgp6W:fR57m2cGckeFjg+Z0Ua3hgp6W
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
resource yara_rule sample family_mirai -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Mirai family
-
Mirai_x86corona family
Files
-
525b0c030e12b76af5556393de3e63a771ae8697f90e2560b0217879ee851247.elf linux x86