Behavioral task
behavioral1
Sample
60fc46fa0c768c423e969c960d7d891725375cae34a2e03148801a859a3e7439
Resource
ubuntu1804-amd64-en-20211208
ubuntu-18.04-amd64
0 signatures
150 seconds
General
-
Target
60fc46fa0c768c423e969c960d7d891725375cae34a2e03148801a859a3e7439
-
Size
113KB
-
MD5
6e74eb026c7eea49433503edcbb69981
-
SHA1
a116ed2a51baef403c43c58bc4ce1f81da9137fa
-
SHA256
60fc46fa0c768c423e969c960d7d891725375cae34a2e03148801a859a3e7439
-
SHA512
13e7170fdbc76e10d95b2f99d672dce2ba14ccf356ec1f94b7a355f237d714222933935454e65f82e61de868d642df8a4199fa7e2fc5bbdf83404dcfac7703ee
-
SSDEEP
3072:GXglAOgktOgKbN5PfFesjC4msFCWHt+Z0Ua3hgp6W:GOgktOpXkaC4meCwt+Z0Ua3hgp6W
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
resource yara_rule sample family_mirai -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Mirai family
-
Mirai_x86corona family
Files
-
60fc46fa0c768c423e969c960d7d891725375cae34a2e03148801a859a3e7439.elf linux x86