Behavioral task
behavioral1
Sample
5146fd6cb1f2663fa6c8c3a5cae2a1506e6950830fc912f9df08fb08cb10c0f3
Resource
ubuntu1804-amd64-en-20211208
ubuntu-18.04-amd64
0 signatures
150 seconds
General
-
Target
5146fd6cb1f2663fa6c8c3a5cae2a1506e6950830fc912f9df08fb08cb10c0f3
-
Size
79KB
-
MD5
687d098fb8a3aace8fa27ddad07df4ef
-
SHA1
3ab3b252b7ce204ca27eb4c5ee51b39d36721ed1
-
SHA256
5146fd6cb1f2663fa6c8c3a5cae2a1506e6950830fc912f9df08fb08cb10c0f3
-
SHA512
56acec11e08a08ad6ed7563af7ca7aca5e0d741fbc47806e594cb6efc70258b75f460cf931f725380bbaaab1b3402e4b163683d3211e52b662cef891a7560dd9
-
SSDEEP
1536:n0Qy/A59ddjQfdRsGyHan2hG8epauzogbBXCAmqeV+LjA4vmF+oVcxjnxjIOO:n0C59ddjQfdFEq248epVBX0b+JmEoVco
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
resource yara_rule sample family_mirai -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Mirai family
-
Mirai_x86corona family
Files
-
5146fd6cb1f2663fa6c8c3a5cae2a1506e6950830fc912f9df08fb08cb10c0f3.elf linux x86