Behavioral task
behavioral1
Sample
51a7314c841485de84369c1d98c6043791f91f76cf85b550528f4943908406ae
Resource
ubuntu1804-amd64-en-20211208
ubuntu-18.04-amd64
0 signatures
150 seconds
General
-
Target
51a7314c841485de84369c1d98c6043791f91f76cf85b550528f4943908406ae
-
Size
75KB
-
MD5
bbd55622095a59c282b62e65b058703f
-
SHA1
cf41c394ebe74fca0be8ddd4ef81375a1ba4b7f7
-
SHA256
51a7314c841485de84369c1d98c6043791f91f76cf85b550528f4943908406ae
-
SHA512
a1cd254893df0d1be155a6a0cddb99e446450b32ca570659d791f7635314358d3f51ff302c6f59a370a435f73529deac30ac7e10f6137df25ac2a030e89cce47
-
SSDEEP
1536:FP2A6nFc6PPOXVjdW/7NCklMuyPBSLcEgTDWVWrVzaTEYmmPXqhRRMzBf4Dc:PKFc6PPOXVjdW/hnMHpSLcf60pWQYmmj
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
resource yara_rule sample family_mirai -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Mirai family
-
Mirai_x86corona family
Files
-
51a7314c841485de84369c1d98c6043791f91f76cf85b550528f4943908406ae.elf linux x86