Behavioral task
behavioral1
Sample
59e9f657a4844f2d9696baac090b044434c20e2b7f445a5863e86c997ee4c1b7
Resource
ubuntu1804-amd64-en-20211208
ubuntu-18.04-amd64
0 signatures
150 seconds
General
-
Target
59e9f657a4844f2d9696baac090b044434c20e2b7f445a5863e86c997ee4c1b7
-
Size
97KB
-
MD5
49330130b51da3e8d13b71cf16cfa1f6
-
SHA1
9991227725dc0f28a6cf7b02202e417a0e7e559b
-
SHA256
59e9f657a4844f2d9696baac090b044434c20e2b7f445a5863e86c997ee4c1b7
-
SHA512
988ec2299c2132784a1cf6a6e0fda26b40a45d722813523a85d05529947e91dec1a2df0340663b1e4485d890212877d04b1fd6ba698f37bedf3c01d8a6a65b0c
-
SSDEEP
3072:8Eksh+7sOXGAekR3aGZaSfFJxX8vECxLv2Q:us6DXZhxauWv2Q
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
resource yara_rule sample family_mirai -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Mirai family
-
Mirai_x86corona family
Files
-
59e9f657a4844f2d9696baac090b044434c20e2b7f445a5863e86c997ee4c1b7.elf linux x86