Behavioral task
behavioral1
Sample
4ee7734bc2d6fd895ecacf110c17d00a8f22b9d9e9238c284aac529e39dc2e61
Resource
ubuntu1804-amd64-en-20211208
ubuntu-18.04-amd64
0 signatures
150 seconds
General
-
Target
4ee7734bc2d6fd895ecacf110c17d00a8f22b9d9e9238c284aac529e39dc2e61
-
Size
70KB
-
MD5
7870b160c025b609b563611a2b5ed7c3
-
SHA1
e5c22a8fcd51b4612e0f0dbc7ac07720706ed0e2
-
SHA256
4ee7734bc2d6fd895ecacf110c17d00a8f22b9d9e9238c284aac529e39dc2e61
-
SHA512
6bd3c3e2474443f8f3449d7f95c229531c8c1d7e5aa24f12761d4f9bfcd61b2762a4ee8334df0f070a755048111e96773250fe9cefc9e6d2c32965a9a789909a
-
SSDEEP
1536:CIY0CH/NQ27qLfEg8ZW0871ZPmF+lVOCjUxfg71:q0CH/C2GLfcsb5ZPmElVOCAxfg71
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
resource yara_rule sample family_mirai -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Mirai family
-
Mirai_x86corona family
Files
-
4ee7734bc2d6fd895ecacf110c17d00a8f22b9d9e9238c284aac529e39dc2e61.elf linux x86