Behavioral task
behavioral1
Sample
522af7f3e09009932a163dd903c0fda217ea7171b5cbfa5d13f9dad19c1299a8
Resource
ubuntu1804-amd64-en-20211208
ubuntu-18.04-amd64
0 signatures
150 seconds
General
-
Target
522af7f3e09009932a163dd903c0fda217ea7171b5cbfa5d13f9dad19c1299a8
-
Size
101KB
-
MD5
90dcf2cc423f268c4d9bfdc56c465ae6
-
SHA1
86899fc0aadf7eee4d77cbb615e24f640ca04679
-
SHA256
522af7f3e09009932a163dd903c0fda217ea7171b5cbfa5d13f9dad19c1299a8
-
SHA512
d47fbe32fffa58cbdbac5f9c6d3027da545d3b8ce17f8c732895022bf2f157f0fe7df9649719e6e045900afa4d000f323f96c9717eff6c951655bb15cfaa7695
-
SSDEEP
3072:BiAF2hYOnjurMqCa0pSsZFVb9qGZgxsKcX6GcgbqB:B3kHjzrZFd9q0gxsKcXJcgbqB
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
resource yara_rule sample family_mirai -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Mirai family
-
Mirai_x86corona family
Files
-
522af7f3e09009932a163dd903c0fda217ea7171b5cbfa5d13f9dad19c1299a8.elf linux x86