Behavioral task
behavioral1
Sample
4f86fc89e6786314346dc7fdf08909eb9c7ce0f3ed20a4d5bcdc14291174b4bd
Resource
ubuntu1804-amd64-en-20211208
ubuntu-18.04-amd64
0 signatures
150 seconds
General
-
Target
4f86fc89e6786314346dc7fdf08909eb9c7ce0f3ed20a4d5bcdc14291174b4bd
-
Size
70KB
-
MD5
ff537f487bf642c54a4227d2167c725d
-
SHA1
dd56f910ddac4a2542085b266d5a4dc7c8c00872
-
SHA256
4f86fc89e6786314346dc7fdf08909eb9c7ce0f3ed20a4d5bcdc14291174b4bd
-
SHA512
eab4b936b8f251c6225cfc9760daf4702d8cad021c6eceab5c50cd575f3d9fed8aae8f07e5c4f77bbd688e9b0baf9f7c5ec49d366797101b9f2b295580fc2b0a
-
SSDEEP
1536:+UaBNJG8EV8+494o9nlmqe8ThfZ9iQSggmd+lVOCjUxfg71:+Uiu84DeVplLFfzpSggmMlVOCAxfg71
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
resource yara_rule sample family_mirai -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Mirai family
-
Mirai_x86corona family
Files
-
4f86fc89e6786314346dc7fdf08909eb9c7ce0f3ed20a4d5bcdc14291174b4bd.elf linux x86