Behavioral task
behavioral1
Sample
a9d571d626081845a0b15e9e17dcc99b8a48e1fea54486c6fa6554f08055b8da
Resource
ubuntu1804-amd64-en-20211208
ubuntu-18.04-amd64
0 signatures
150 seconds
General
-
Target
a9d571d626081845a0b15e9e17dcc99b8a48e1fea54486c6fa6554f08055b8da
-
Size
66KB
-
MD5
cb83df289f448aab74352cf22b097b61
-
SHA1
ff8d0712f50bc2263e9c3eb51296ec80dc60166f
-
SHA256
a9d571d626081845a0b15e9e17dcc99b8a48e1fea54486c6fa6554f08055b8da
-
SHA512
be7fd88d6d7f35867ca0d982f2e19e5cc117b5091922cd00631a3ed2975d207d736e5fbd427cff5f32e6f45269f3bfc600274fbc3a9522aaab47f56114b02a37
-
SSDEEP
1536:62NiGHuSQdhfI31+iLm89rh1f9B1+vrxE3md+lFOZzfufHEZ:62oGHuvdVA7dt11vYx8mMlFOZLufHEZ
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
resource yara_rule sample family_mirai -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Mirai family
-
Mirai_x86corona family
Files
-
a9d571d626081845a0b15e9e17dcc99b8a48e1fea54486c6fa6554f08055b8da.elf linux x86