Behavioral task
behavioral1
Sample
ae11c85a6fdfb5cd89716dd0243fd594
Resource
ubuntu1804-amd64-en-20211208
ubuntu-18.04-amd64
0 signatures
150 seconds
General
-
Target
ae11c85a6fdfb5cd89716dd0243fd594
-
Size
83KB
-
MD5
ae11c85a6fdfb5cd89716dd0243fd594
-
SHA1
708730e973bb4c4138e2390f9faef46a06a3b212
-
SHA256
6d5c9912bcaa63b304739120f4c4c2df656f6711cda0973015f6a87c2f8fd603
-
SHA512
5998dde58a02735b3c17c586eb3281748ef4b3b8afa67e2e89831849e12a54f58d84eb7f174652612441b7ad8c68d4d776876e5090d600a97789358597030400
-
SSDEEP
1536:W35b9Vc4N3J6lreu5r4hWj8LnWDloRmF+wVOz+sXcfW7k:Ab9Vc4JJ6liuq0YD2oRmEwVOz+ucfW7k
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
resource yara_rule sample family_mirai -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Mirai family
-
Mirai_x86corona family
Files
-
ae11c85a6fdfb5cd89716dd0243fd594.elf linux x86