Behavioral task
behavioral1
Sample
c90a2f92695e949ec81e5fdca2eb6c5359c9556405decbd657a0ed18150aeabe
Resource
ubuntu1804-amd64-en-20211208
ubuntu-18.04-amd64
0 signatures
150 seconds
General
-
Target
c90a2f92695e949ec81e5fdca2eb6c5359c9556405decbd657a0ed18150aeabe
-
Size
78KB
-
MD5
503ed7b12ca5edbfff746c5e65d48472
-
SHA1
d4cb9b4db6d2694b037a25ce5c905eef2b570562
-
SHA256
c90a2f92695e949ec81e5fdca2eb6c5359c9556405decbd657a0ed18150aeabe
-
SHA512
50c366adcfe34589a3942d171dfa8ef73a95780032f89a5c383c93c90e0306fbd2afc8e4eea55a471a06a4a3cef0fa1dd7ae5bd4777843d549bb236f077cea46
-
SSDEEP
1536:qoJk9t5sPrPVj6WH0NnpV0ksvKwwOEReg4BsKhWH88V66666flm8E1V8zlimP+lJ:Ot5sPrPVj6WH0NpqvzwOEReh0cZlI7m2
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
resource yara_rule sample family_mirai -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Mirai family
-
Mirai_x86corona family
Files
-
c90a2f92695e949ec81e5fdca2eb6c5359c9556405decbd657a0ed18150aeabe.elf linux x86