Behavioral task
behavioral1
Sample
5892c1e2eb2b18aed0628c7e32f6286c87ee39475dc3a56012154b86207b0de5
Resource
ubuntu1804-amd64-en-20211208
ubuntu-18.04-amd64
0 signatures
150 seconds
General
-
Target
5892c1e2eb2b18aed0628c7e32f6286c87ee39475dc3a56012154b86207b0de5
-
Size
75KB
-
MD5
6db44b2c5828d840cd4808af6ac534d4
-
SHA1
4a3303d5ec9a984af667c7180fde959495fb7e90
-
SHA256
5892c1e2eb2b18aed0628c7e32f6286c87ee39475dc3a56012154b86207b0de5
-
SHA512
84e825c10bcbcc856d411cccddae7395de8d236e0ea0ff3abaf6c57594a206f31f64d63070b02e01af49c11e19d557e5141eea524a25d0c90c47261c91bfc811
-
SSDEEP
1536:yl1i4e99tJj8mONsjwyzge+CKUV9xUPcMUZXXxO0v4im3XqhRRMzBf4Dc:yl0t9tJj8TjyzN+j2UPxKFLmnqhRRMBP
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
resource yara_rule sample family_mirai -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Mirai family
-
Mirai_x86corona family
Files
-
5892c1e2eb2b18aed0628c7e32f6286c87ee39475dc3a56012154b86207b0de5.elf linux x86