Behavioral task
behavioral1
Sample
52248c437054fcb29af0d08c1fb6a98c2ef8bf2a24e70095251cf7c202ab66e4
Resource
ubuntu1804-amd64-en-20211208
ubuntu-18.04-amd64
0 signatures
150 seconds
General
-
Target
52248c437054fcb29af0d08c1fb6a98c2ef8bf2a24e70095251cf7c202ab66e4
-
Size
97KB
-
MD5
e9fba285a433dd0ae13854366ec2c287
-
SHA1
7b91ff95e64aceb4e385771802209277b8e3bf17
-
SHA256
52248c437054fcb29af0d08c1fb6a98c2ef8bf2a24e70095251cf7c202ab66e4
-
SHA512
4d5e08996cff6033b51c63a3bcf134a4c81b69e07bab827da1bfc774b737e203bddd04c1b391ec935b9f6444a17056d21f2997327f3fd9dce79f7bfad8e3f8ba
-
SSDEEP
3072:WGLnuIGjk4/IhbR9hJpW2rqpadaleeGJQNjjywBKr20:9nuIGjk4wP+sdaleeWQNjjywBKr20
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
resource yara_rule sample family_mirai -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Mirai family
-
Mirai_x86corona family
Files
-
52248c437054fcb29af0d08c1fb6a98c2ef8bf2a24e70095251cf7c202ab66e4.elf linux x86