Behavioral task
behavioral1
Sample
55d5251187c7a21ab0adafd94d519171cec9e2a7ab9e429b715500ed9f896881
Resource
ubuntu1804-amd64-en-20211208
0 signatures
150 seconds
General
-
Target
55d5251187c7a21ab0adafd94d519171cec9e2a7ab9e429b715500ed9f896881
-
Size
67KB
-
MD5
1dbe0f7d4181fa0a5dac884757f0af95
-
SHA1
376370791c02f275a18ee8d6ff2069c64a46129a
-
SHA256
55d5251187c7a21ab0adafd94d519171cec9e2a7ab9e429b715500ed9f896881
-
SHA512
130f27c59d08599fd21d379a09ebc31f721b943271192f48c9205004dd1701791c4cb0be015304f98c054a7963a4da2e310a93747ea444cfe22cb7312187524b
-
SSDEEP
1536:e98b4EmDIdV5LTepgWncXyocLimF+xVOV/fufHEZ:zb4EmDI1LeNc9GimExVOVXufHEZ
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
Processes:
resource yara_rule sample family_mirai -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
Processes:
resource yara_rule sample family_mirai_x86corona -
Mirai family
-
Mirai_x86corona family
Files
-
55d5251187c7a21ab0adafd94d519171cec9e2a7ab9e429b715500ed9f896881.elf linux x86