Behavioral task
behavioral1
Sample
5547e63cb411f7c4ba35e28ac90d7d58fda3608378581bac311174505d0bbef2
Resource
ubuntu1804-amd64-en-20211208
ubuntu-18.04-amd64
0 signatures
150 seconds
General
-
Target
5547e63cb411f7c4ba35e28ac90d7d58fda3608378581bac311174505d0bbef2
-
Size
72KB
-
MD5
0e9c5144d075a270bf8a9752dcd0baf2
-
SHA1
e3636ef4b766ca7ea949edfee8942d23ff92a03d
-
SHA256
5547e63cb411f7c4ba35e28ac90d7d58fda3608378581bac311174505d0bbef2
-
SHA512
c7f707ef0c26edf6c0b80f839b91351c3c5ff96dbc9fe84f09a42f7207233021b7d2220b46749bbc6929d5006b59e763bcde2b13a2e51afb0075ed1cd71d9376
-
SSDEEP
1536:kegsPutVXwLcrBa+U4xBBVuaCwrzaNgE2zE2OR3v14ahgnrXr/ms9:k8uQQrBdU4x3UaZEgE2gvWahgnzr/ms9
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
Processes:
resource yara_rule sample family_mirai -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
Processes:
resource yara_rule sample family_mirai_x86corona -
Mirai family
-
Mirai_x86corona family
Files
-
5547e63cb411f7c4ba35e28ac90d7d58fda3608378581bac311174505d0bbef2.elf linux x86