Behavioral task
behavioral1
Sample
4fbeb93f057bc4d01409f9fe6b868474641672db2faa70681fed33fe95682439
Resource
ubuntu1804-amd64-en-20211208
ubuntu-18.04-amd64
0 signatures
150 seconds
General
-
Target
4fbeb93f057bc4d01409f9fe6b868474641672db2faa70681fed33fe95682439
-
Size
66KB
-
MD5
5ddfb8e7a762ab47fa813512920e1906
-
SHA1
a3a409bc8fcb9c1237b2b3f00be6275af45eb8e3
-
SHA256
4fbeb93f057bc4d01409f9fe6b868474641672db2faa70681fed33fe95682439
-
SHA512
cf38816b0cc47851e24cde481e44396f0fc965c0abb94645f70a5f7eca7690a57cffc83f970f1377a9195ad34d0b6a8d3f9667ec1d17f484373e6313105d7332
-
SSDEEP
1536:RRVYPCNH1jUdOn4JymPWBSgSh1MtNbr/NbHBDSDmd+l2OZ/fufYEZ:RRUCNH1gdikrEHM1IBrVbJSDmMl2OZXa
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
resource yara_rule sample family_mirai -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Mirai family
-
Mirai_x86corona family
Files
-
4fbeb93f057bc4d01409f9fe6b868474641672db2faa70681fed33fe95682439.elf linux x86