Behavioral task
behavioral1
Sample
c960da645a5032b0b589a1fd65cf91f087d24fa211756c0e7dd583df6de5c6b9
Resource
ubuntu1804-amd64-en-20211208
ubuntu-18.04-amd64
0 signatures
150 seconds
General
-
Target
c960da645a5032b0b589a1fd65cf91f087d24fa211756c0e7dd583df6de5c6b9
-
Size
66KB
-
MD5
dc9dca9b4dbe131828037bfe07d34544
-
SHA1
c55f794ce33530a65dd516c7afe48f9b9bed3180
-
SHA256
c960da645a5032b0b589a1fd65cf91f087d24fa211756c0e7dd583df6de5c6b9
-
SHA512
e700085e6e47bd6ca0b2bf45f76ecbdda1ce5f47e7d787a704ae1609748202120d8dd1d0bd4a17dada6d1b1b7478a20e9dd8d1e02c394be3fb48d3a4d60a9c16
-
SSDEEP
1536:CWVYPCJH1jUdOn4JymPWBSgSh1MtNrr/NbHBDSDmd+l2OZ/fufYEZ:CWUCJH1gdikrEHM1ItrVbJSDmMl2OZXa
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
resource yara_rule sample family_mirai -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Mirai family
-
Mirai_x86corona family
Files
-
c960da645a5032b0b589a1fd65cf91f087d24fa211756c0e7dd583df6de5c6b9.elf linux x86