Behavioral task
behavioral1
Sample
cc98d709a9b9be5af614ee9cdaa54319d9599f3d76b906f45152d5bdb0f8d638
Resource
ubuntu1804-amd64-en-20211208
ubuntu-18.04-amd64
0 signatures
150 seconds
General
-
Target
cc98d709a9b9be5af614ee9cdaa54319d9599f3d76b906f45152d5bdb0f8d638
-
Size
72KB
-
MD5
1673c290df6683f21c86502f423d35fe
-
SHA1
8383c8ece04f72f3f32daffe8601372c408b1af9
-
SHA256
cc98d709a9b9be5af614ee9cdaa54319d9599f3d76b906f45152d5bdb0f8d638
-
SHA512
d21169206c41d63212d88c227e4008694b437a5dda63d7cc9c92b02299fc3a27beff5f426359a67b73708d99f358909b429f231c20a785b45baaf68ff8fed875
-
SSDEEP
1536:pb2ltvMPY/VjoWPYGkFxKnDUM234KYG7FJKWiacl+0g3id92DnmP+lVrCjmxfZp1:IltvMPY/VjoWPYrxKnDw34xg7PcY0goe
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
resource yara_rule sample family_mirai -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Mirai family
-
Mirai_x86corona family
Files
-
cc98d709a9b9be5af614ee9cdaa54319d9599f3d76b906f45152d5bdb0f8d638.elf linux x86