Behavioral task
behavioral1
Sample
8f4e3a7679ef50d9e7937dfbabb7206b5a2c8dc61e8100aa73b13b841437e812
Resource
ubuntu1804-amd64-en-20211208
ubuntu-18.04-amd64
0 signatures
150 seconds
General
-
Target
8f4e3a7679ef50d9e7937dfbabb7206b5a2c8dc61e8100aa73b13b841437e812
-
Size
76KB
-
MD5
0bb48b256dbe1126a424806c314645d4
-
SHA1
94e63e0a9be8d66925e73530b791410d7c83c662
-
SHA256
8f4e3a7679ef50d9e7937dfbabb7206b5a2c8dc61e8100aa73b13b841437e812
-
SHA512
e0470158c195f03225aa04a135a476d5533e9a354b054000ab6ebb59be6de60be89731782661c3b4b26b5aeab6dd03f2c27b97d43f2d60e49758fba5f05346b3
-
SSDEEP
1536:HbE3bg9EjybsUnJlxCJhMNhVxcEutZBY5FL0kXHrqm37SVcFPLE/n9E:HbqjDUJ+Jhsvxchtnjk2mrSVcFjE/n9E
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
resource yara_rule sample family_mirai -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Mirai family
-
Mirai_x86corona family
Files
-
8f4e3a7679ef50d9e7937dfbabb7206b5a2c8dc61e8100aa73b13b841437e812.elf linux x86