Behavioral task
behavioral1
Sample
50611077f281a112d52ab4d68a6ddabdefcb2da84791d15f39809269e38f473f
Resource
ubuntu1804-amd64-en-20211208
ubuntu-18.04-amd64
1 signatures
150 seconds
General
-
Target
50611077f281a112d52ab4d68a6ddabdefcb2da84791d15f39809269e38f473f
-
Size
53KB
-
MD5
3f7095d6761ccd2c05b6c19a5f1074d7
-
SHA1
a1c80901ef6e3ef815dd97dbd9a954e36050e3cc
-
SHA256
50611077f281a112d52ab4d68a6ddabdefcb2da84791d15f39809269e38f473f
-
SHA512
1610de32502874572ebb2de93ac3387aa37e1f941fd46f1fd94c9f09374064a5dfcf0bee10fab5839a39d5a2de09b4abaa4bf39e037f1e424c45f1b3b2607788
-
SSDEEP
768:t49PXMHSe7FiXu4USCe8TjTMOLfxx0XIu5s8qqSqVAqIyz:iNXPexz4USFstLfxx04u5GqSqH
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
resource yara_rule sample family_mirai -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Mirai family
-
Mirai_x86corona family
Files
-
50611077f281a112d52ab4d68a6ddabdefcb2da84791d15f39809269e38f473f.elf linux x86