Behavioral task
behavioral1
Sample
50bd34dcd47f61c76ae1a98058f45b2b71c8da485f528ad9ff3a3792c70f2c2c
Resource
ubuntu1804-amd64-en-20211208
ubuntu-18.04-amd64
0 signatures
150 seconds
General
-
Target
50bd34dcd47f61c76ae1a98058f45b2b71c8da485f528ad9ff3a3792c70f2c2c
-
Size
71KB
-
MD5
9cd62965ac346dfbba215942e93f5f72
-
SHA1
7bfd5f8b59e29f7ff453e1679e5d549460299f31
-
SHA256
50bd34dcd47f61c76ae1a98058f45b2b71c8da485f528ad9ff3a3792c70f2c2c
-
SHA512
f407c66db3a17ad7cc9327be5a0b91486044942d3f1186f1e17850e1887fdb455d627f36366e58dc74c4dd205730d6c2fbc46ce2728c030de13472019ad26948
-
SSDEEP
1536:0mM1Ft9tpjJggRdotARSlEwyWpi0PqUuEQC+0mjm3+lVrCjmxfZp1:0m039tpjJggR+AwlbQ0PLVQP0mjmOlVf
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
resource yara_rule sample family_mirai -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Mirai family
-
Mirai_x86corona family
Files
-
50bd34dcd47f61c76ae1a98058f45b2b71c8da485f528ad9ff3a3792c70f2c2c.elf linux x86