Behavioral task
behavioral1
Sample
a4ea4942fe451a7d550c9d38362687f6a26fba6e8b7ddef1141cda029b8e4186
Resource
ubuntu1804-amd64-en-20211208
ubuntu-18.04-amd64
2 signatures
150 seconds
General
-
Target
a4ea4942fe451a7d550c9d38362687f6a26fba6e8b7ddef1141cda029b8e4186
-
Size
119KB
-
MD5
7090976b3d3a3985d69dc5ede6be6089
-
SHA1
5cf879d9943828b368b8d72ffa5bbf69b8e2e473
-
SHA256
a4ea4942fe451a7d550c9d38362687f6a26fba6e8b7ddef1141cda029b8e4186
-
SHA512
52dd93296e0a5c8ee18557a8395f0aaddddf40eb96344c1db0ab7666d5c3791431eb9cc4f8231a488d372c0745e7de4edf5f776ffc8ea201bde50c6c496b19be
-
SSDEEP
3072:6kh77IqRbg9YMSwweA4G2JfF1Y3+kv69ny6JP/KTiFi:6ExbgiMCoZJfg+kv69ny6JHKTiFi
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
resource yara_rule sample family_mirai -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Mirai family
-
Mirai_x86corona family
Files
-
a4ea4942fe451a7d550c9d38362687f6a26fba6e8b7ddef1141cda029b8e4186.elf linux x86