Behavioral task
behavioral1
Sample
f70e209f69a1557cb178d5c57cceb6213bf101be9970deb87ca91b5c63a5022e
Resource
ubuntu1804-amd64-en-20211208
ubuntu-18.04-amd64
0 signatures
150 seconds
General
-
Target
f70e209f69a1557cb178d5c57cceb6213bf101be9970deb87ca91b5c63a5022e
-
Size
71KB
-
MD5
775d83313833bc27024fd9356dcb5c14
-
SHA1
95ac20c6f88087451710f1dbf93b8c3c2206d8eb
-
SHA256
f70e209f69a1557cb178d5c57cceb6213bf101be9970deb87ca91b5c63a5022e
-
SHA512
8610892bb08d3edc0238c4067967c4dcdc46a6f00fb931566471bfd675dd6b7902815893a8bc7f6fd8b403b7de7c65fc8a6d7027c439c1df00e357a101417e3e
-
SSDEEP
1536:J5MwFp9tpjJovR3FN9Uizrtq6DaxHxV8usL2C65WVsxm3+lVrCjmxfZp1:J5xT9tpjJovRn91zRSFxG9L365xmOlVf
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
resource yara_rule sample family_mirai -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Mirai family
-
Mirai_x86corona family
Files
-
f70e209f69a1557cb178d5c57cceb6213bf101be9970deb87ca91b5c63a5022e.elf linux x86