Behavioral task
behavioral1
Sample
54579d141a8832541672979e94fd8e7963cbeb705c89fa2f1f49c9a12ee8e819
Resource
ubuntu1804-amd64-en-20211208
ubuntu-18.04-amd64
0 signatures
150 seconds
General
-
Target
54579d141a8832541672979e94fd8e7963cbeb705c89fa2f1f49c9a12ee8e819
-
Size
91KB
-
MD5
ba410fd4661eab6d18fb0b3c25d9546c
-
SHA1
574f22a7f9037b3ce2203ea1c5e32b35ba657ab8
-
SHA256
54579d141a8832541672979e94fd8e7963cbeb705c89fa2f1f49c9a12ee8e819
-
SHA512
ad850a87ac9c6880dfc1ebd4e7325cf09c86af9249feaf3a335e3f78d20271ecb6aa04d03ae92db20da960dc7c284890ea01d4bad5360fceaa8c1cfba03ae92d
-
SSDEEP
1536:75sU06L3pmyDOZ/S9xBS5MwSWtxXuD5FrKdhQiOIvxplSYmNq+Vj1u3KPdCl:9sU0o9OdS9zS5jptduudhQslSYm8+Vj+
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
resource yara_rule sample family_mirai -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Mirai family
-
Mirai_x86corona family
Files
-
54579d141a8832541672979e94fd8e7963cbeb705c89fa2f1f49c9a12ee8e819.elf linux x86