Behavioral task
behavioral1
Sample
5142729006f524e3befe5e4cb892a62a32b0bcd0af29b679983dbe0fe8853341
Resource
ubuntu1804-amd64-en-20211208
ubuntu-18.04-amd64
0 signatures
150 seconds
General
-
Target
5142729006f524e3befe5e4cb892a62a32b0bcd0af29b679983dbe0fe8853341
-
Size
78KB
-
MD5
fdfc213103d05d64a6a02d118a01a74a
-
SHA1
645a03f26b533b5bb3a0f4da5feb2dab4e376029
-
SHA256
5142729006f524e3befe5e4cb892a62a32b0bcd0af29b679983dbe0fe8853341
-
SHA512
0c335b1ca087c8f441ccdb732f352459ec385f7cb535fb1b5856da3a32200087d9203cc7a56d67d55011130393aac4c7343889c47f06b547cf5610aa3c792148
-
SSDEEP
1536:RU0V/kwD921jCrZqc3OytkIOiszrWaFjKKlOARx66666jI5KlFktq3Nm3+lVrCje:S0lb921jCNqX6jORzrgKlzkIayEmOlVf
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
resource yara_rule sample family_mirai -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Mirai family
-
Mirai_x86corona family
Files
-
5142729006f524e3befe5e4cb892a62a32b0bcd0af29b679983dbe0fe8853341.elf linux x86