Behavioral task
behavioral1
Sample
4f6263c100b9368f211043f631ceef98880d506a3555e0c23f90370e61b71f17
Resource
ubuntu1804-amd64-en-20211208
ubuntu-18.04-amd64
0 signatures
150 seconds
General
-
Target
4f6263c100b9368f211043f631ceef98880d506a3555e0c23f90370e61b71f17
-
Size
73KB
-
MD5
d0d3677fdae9ac1c87ec39685a40944e
-
SHA1
03c19b32f869d11638d1e1c10d07e3f86b627d41
-
SHA256
4f6263c100b9368f211043f631ceef98880d506a3555e0c23f90370e61b71f17
-
SHA512
3093e873ea853f371081fa93a8c430ee22d7956d32c2e259862d406a1a053dcd968eeea6bdfb42efc6fb167175a9d0cced7b048c01ff88f1a8b6227b46d843ad
-
SSDEEP
1536:c3Fq/B/nV6WeWa8X/jPZD+axnwVN5JAxJuA3vB4ahgnrXr/ms9:ck/RV66lvjPZqaxnE5JAxfvyahgnzr/x
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
resource yara_rule sample family_mirai -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Mirai family
-
Mirai_x86corona family
Files
-
4f6263c100b9368f211043f631ceef98880d506a3555e0c23f90370e61b71f17.elf linux x86