Behavioral task
behavioral1
Sample
4f5e9f9ea8081e92be4888aa7537297af8ee85e64e3e1bb0a3f467124fab2c76
Resource
ubuntu1804-amd64-en-20211208
ubuntu-18.04-amd64
0 signatures
150 seconds
General
-
Target
4f5e9f9ea8081e92be4888aa7537297af8ee85e64e3e1bb0a3f467124fab2c76
-
Size
94KB
-
MD5
012cbb126a73f36f87d1ff8a2fdca7c2
-
SHA1
e643a6526d827743ce82392ff49f82a45abbee6c
-
SHA256
4f5e9f9ea8081e92be4888aa7537297af8ee85e64e3e1bb0a3f467124fab2c76
-
SHA512
b4bff78598f68886c55de1b82b4bf3c4ec5afc3c5a70dd8d6cbaf271f6f6cae9aebd9b3ebc645c05a7af4908b582628fe49def6bbd1447513d0f01fc987e1e25
-
SSDEEP
1536:NEt6hnR2RPXaVjAW9Yrip3BO8sVEMfWbs5TMWp2Mr+5aCW5dvQLMIlFMnkid4oic:ukR2RPXaVjAW9Yrip3BO3V2Q5TMWp2Mz
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
resource yara_rule sample family_mirai -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Mirai family
-
Mirai_x86corona family
Files
-
4f5e9f9ea8081e92be4888aa7537297af8ee85e64e3e1bb0a3f467124fab2c76.elf linux x86