Behavioral task
behavioral1
Sample
e8ee9e70091925a17c383dbc99755a974e9355a0e8ab4aedc8f4a024373c1e73
Resource
ubuntu1804-amd64-en-20211208
0 signatures
150 seconds
General
-
Target
e8ee9e70091925a17c383dbc99755a974e9355a0e8ab4aedc8f4a024373c1e73
-
Size
66KB
-
MD5
2f0bcd2f2192cb66e87f5bbafae17e91
-
SHA1
ea8c6483a72be64a72b4d5e6679de42d94f6540c
-
SHA256
e8ee9e70091925a17c383dbc99755a974e9355a0e8ab4aedc8f4a024373c1e73
-
SHA512
7d3c68ddf7531aafd0927c33928f04f9b97d7e31896be2dc1db540b3d612dc8c82aec73dca671290fff581c9565336a5e81ba108ead0dbc2cdc5a17913da607b
-
SSDEEP
1536:6iQsISazUedNkhkwiI4TXrxi85FLcFwzhv7PtKOM23mng2c:6iBeddI8bUGcFwzhzPtKOV3mng2c
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
Processes:
resource yara_rule sample family_mirai -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
Processes:
resource yara_rule sample family_mirai_x86corona -
Mirai family
-
Mirai_x86corona family
Files
-
e8ee9e70091925a17c383dbc99755a974e9355a0e8ab4aedc8f4a024373c1e73.elf linux x86