Behavioral task
behavioral1
Sample
61704b508993d715756134d4f51f29677d6db5408137cc9a809aecb3757de151
Resource
ubuntu1804-amd64-en-20211208
ubuntu-18.04-amd64
2 signatures
150 seconds
General
-
Target
61704b508993d715756134d4f51f29677d6db5408137cc9a809aecb3757de151
-
Size
46KB
-
MD5
98613e0c9ab6b7435aceffb5dfa4e7b8
-
SHA1
2e082f737bf29175769efe3991dfd752e418f6a2
-
SHA256
61704b508993d715756134d4f51f29677d6db5408137cc9a809aecb3757de151
-
SHA512
760747051caccce5e5951cdc7e025d76c1cf538b8811e9660812b1073c04cc870cc45d48e737ba5cc58c2de6402bfdb1b0278166bf3a424b2f72dbc41a7fa0f7
-
SSDEEP
768:tls5yOVuduuF6cfG8JDnZ73SCeoyDPIih897xkM+aIO:tlNyudLF6cfG4x0oUPIia1p+a
Score
10/10
Malware Config
Signatures
-
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Mirai_x86corona family
Files
-
61704b508993d715756134d4f51f29677d6db5408137cc9a809aecb3757de151.elf linux x86