Behavioral task
behavioral1
Sample
4ee1447866b3f3dd40e2b51a7709889804d1d6876515e5e90e1cce99fcba4cdb
Resource
ubuntu1804-amd64-en-20211208
ubuntu-18.04-amd64
0 signatures
150 seconds
General
-
Target
4ee1447866b3f3dd40e2b51a7709889804d1d6876515e5e90e1cce99fcba4cdb
-
Size
76KB
-
MD5
e9b357d8e80d06c6838c02270902308e
-
SHA1
ae9e742bf32ed8969404794e837ba34a6efea75d
-
SHA256
4ee1447866b3f3dd40e2b51a7709889804d1d6876515e5e90e1cce99fcba4cdb
-
SHA512
7c16bbc596bb31abc718f8b510c0275726f579ce137b9cced7996546be686ba060932f57ddbb61a646876f40397b7f6ee56c0aa60a697be716c3022c477f7515
-
SSDEEP
1536:jIyS/pt/5bbpYWGKXX0bNK+ImCBF+klV+CABGm37SVcFPLE/n9E:Upt/R/DHiNK+Im6+k6GmrSVcFjE/n9E
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
resource yara_rule sample family_mirai -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Mirai family
-
Mirai_x86corona family
Files
-
4ee1447866b3f3dd40e2b51a7709889804d1d6876515e5e90e1cce99fcba4cdb.elf linux x86