Behavioral task
behavioral1
Sample
4f2a344220220db26bc657e28d02f69e5b26fd3eda47a8463f07b67a58a04e59
Resource
ubuntu1804-amd64-en-20211208
ubuntu-18.04-amd64
0 signatures
150 seconds
General
-
Target
4f2a344220220db26bc657e28d02f69e5b26fd3eda47a8463f07b67a58a04e59
-
Size
88KB
-
MD5
eb39a80d74e3e9fbc2e1b51cbc5b6f3f
-
SHA1
56c1d9c7a2105aa4f57ee6faef3f3e3d9b32ffde
-
SHA256
4f2a344220220db26bc657e28d02f69e5b26fd3eda47a8463f07b67a58a04e59
-
SHA512
80c1ea975e5d09432f7ad39f02c90b88b0a1b625389e386e1c23344a3d9d90e86311d3fe3fd31aedb782856f3761b41a80e584c40539b1b23d08c3fa2ce43b6f
-
SSDEEP
1536:IQ9yI+0nr5DPpsVjzWyqkJXxwnwWVM50NKuHqxPb5HOwygdxETSD5IygmdICV1Xc:RM0r5DPpsVjzWyqkJs9q5AKuHqxFHQgo
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
resource yara_rule sample family_mirai -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Mirai family
-
Mirai_x86corona family
Files
-
4f2a344220220db26bc657e28d02f69e5b26fd3eda47a8463f07b67a58a04e59.elf linux x86