Behavioral task
behavioral1
Sample
5c728ff372d202628ad80e65deb117fcd3f9ac349408c42e948ea2423bb231f7
Resource
ubuntu1804-amd64-en-20211208
ubuntu-18.04-amd64
0 signatures
150 seconds
General
-
Target
5c728ff372d202628ad80e65deb117fcd3f9ac349408c42e948ea2423bb231f7
-
Size
72KB
-
MD5
2f66c5199bd894d0192d4dd702abc568
-
SHA1
8354008ff954e50d5dda27b243848cdbbdc298b4
-
SHA256
5c728ff372d202628ad80e65deb117fcd3f9ac349408c42e948ea2423bb231f7
-
SHA512
d0ff79a78a0bcd043cb43f6d18201b718cdc4d39387473c2e6f120d5d6f1e645070c405c458e07f8ca8df4d4074aecec8cf847e96f588191102eae9c3db9cf63
-
SSDEEP
1536:kegsPutVXwLcrBa+U4xBBVuaCwrzaNxl2zE2OR3v14ahgnrXr/ms9:k8uQQrBdU4x3UaZExl2gvWahgnzr/ms9
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
resource yara_rule sample family_mirai -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Mirai family
-
Mirai_x86corona family
Files
-
5c728ff372d202628ad80e65deb117fcd3f9ac349408c42e948ea2423bb231f7.elf linux x86