Behavioral task
behavioral1
Sample
504119ef3eb0f7700e6d68607ddfc33e36da6dff1f6c3a1edde8dc489c6e9c34
Resource
ubuntu1804-amd64-en-20211208
ubuntu-18.04-amd64
0 signatures
150 seconds
General
-
Target
504119ef3eb0f7700e6d68607ddfc33e36da6dff1f6c3a1edde8dc489c6e9c34
-
Size
66KB
-
MD5
05a50f81fdceeececa2e9169332a804d
-
SHA1
2f6789b845b9de4f39799025959e831ed4de0ff6
-
SHA256
504119ef3eb0f7700e6d68607ddfc33e36da6dff1f6c3a1edde8dc489c6e9c34
-
SHA512
3e8f2907b3905be29231f028febf8b645064728fd779010ed4bca7da2d3086d2a531400b440648ebcadf46292ac23ccec25d62523e2c90cbc3a743bfc4a3daeb
-
SSDEEP
1536:CWVYPCJH1jUdOn4JymPWBSgSh1MtNsr/NbHBDSDmd+l2OZ/fufYEZ:CWUCJH1gdikrEHM1IGrVbJSDmMl2OZXa
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
resource yara_rule sample family_mirai -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Mirai family
-
Mirai_x86corona family
Files
-
504119ef3eb0f7700e6d68607ddfc33e36da6dff1f6c3a1edde8dc489c6e9c34.elf linux x86