Behavioral task
behavioral1
Sample
7005a0d3a6d2889df78cbf50ec030c43e0f5bdfbdee38348367e65b17d533e70
Resource
ubuntu1804-amd64-en-20211208
ubuntu-18.04-amd64
0 signatures
150 seconds
General
-
Target
7005a0d3a6d2889df78cbf50ec030c43e0f5bdfbdee38348367e65b17d533e70
-
Size
76KB
-
MD5
b0c93eec1a88c1841e62522fdfd74ca3
-
SHA1
225a70e254b362f061666b0b427be5dc430d9a5e
-
SHA256
7005a0d3a6d2889df78cbf50ec030c43e0f5bdfbdee38348367e65b17d533e70
-
SHA512
b882eed956502d5f808a58d657a7c0340180c21e6e17bfe24fc8f03c2ab1c91ee3185d65a9775af04059e406faf694411b4fc08c7e9594d6ba52f544727fde01
-
SSDEEP
1536:HiEYbgsEjybsUnJ+xCJhMNhVxcEutZBY5FLTkXHrqm37SVcFPLE/n9E:HiOjDUJVJhsvxchtn8k2mrSVcFjE/n9E
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
resource yara_rule sample family_mirai -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Mirai family
-
Mirai_x86corona family
Files
-
7005a0d3a6d2889df78cbf50ec030c43e0f5bdfbdee38348367e65b17d533e70.elf linux x86