Behavioral task
behavioral1
Sample
549a8210c042b4b2bc967539ffbf254dcdb94155cdcc138ee20246e2112bb0ea
Resource
ubuntu1804-amd64-en-20211208
ubuntu-18.04-amd64
0 signatures
150 seconds
General
-
Target
549a8210c042b4b2bc967539ffbf254dcdb94155cdcc138ee20246e2112bb0ea
-
Size
70KB
-
MD5
b3c2deccf0295bc90b76b0ecd014a8fd
-
SHA1
a5ba032cd006e7b2608cf49428d1a60599bb1c6d
-
SHA256
549a8210c042b4b2bc967539ffbf254dcdb94155cdcc138ee20246e2112bb0ea
-
SHA512
1dba90aa9480147500ea82439147968e75f90a03d4897af2650c60a6e380a61773897978d95f6c3aacab0eed6e02c842e30a00c951a3ff7cffd2d29dda3b26e5
-
SSDEEP
1536:+UaBNJG8EV8+494o9nlmqe8ThfZ9isSggmd+lVOCjUxfg71:+Uiu84DeVplLFfz1SggmMlVOCAxfg71
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
resource yara_rule sample family_mirai -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Mirai family
-
Mirai_x86corona family
Files
-
549a8210c042b4b2bc967539ffbf254dcdb94155cdcc138ee20246e2112bb0ea.elf linux x86