Behavioral task
behavioral1
Sample
d8f1feccb668fb308e610a638bd227b05ec0c5f3ae94370a523877c9204830e3
Resource
ubuntu1804-amd64-en-20211208
ubuntu-18.04-amd64
0 signatures
150 seconds
General
-
Target
d8f1feccb668fb308e610a638bd227b05ec0c5f3ae94370a523877c9204830e3
-
Size
71KB
-
MD5
b954b8baee1f3c5b96c6e626b6394f95
-
SHA1
98bb0bc521088fd4fed23aa1ccdad087d33c14ff
-
SHA256
d8f1feccb668fb308e610a638bd227b05ec0c5f3ae94370a523877c9204830e3
-
SHA512
e55090f6a4f0e0951d69f56e13791152f3dd4a70afb31e1273c81bb3fe9253d0c0366ee87bf25dfa4c6560092c47043376a190ec6f74e77025285e23523f4a93
-
SSDEEP
1536:ZLM1Fp9tpjJLegR9otARSlEwyWpi0PqUu8IhDCUTcgm3+lVrCjmxfZp1:ZL0D9tpjJLegReAwlbQ0PLlIlCUTTmO7
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
resource yara_rule sample family_mirai -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Mirai family
-
Mirai_x86corona family
Files
-
d8f1feccb668fb308e610a638bd227b05ec0c5f3ae94370a523877c9204830e3.elf linux x86