Behavioral task
behavioral1
Sample
5d7a6b3f89a97ff4149ec4469b49d1e9bd88a3d037df2f0ed3f3dece441cc651
Resource
ubuntu1804-amd64-en-20211208
ubuntu-18.04-amd64
2 signatures
150 seconds
General
-
Target
5d7a6b3f89a97ff4149ec4469b49d1e9bd88a3d037df2f0ed3f3dece441cc651
-
Size
130KB
-
MD5
c0c7079fd35292a61b1e37c9dfb177c0
-
SHA1
245fd2c102c81371e03166c8e1df5e320a81b322
-
SHA256
5d7a6b3f89a97ff4149ec4469b49d1e9bd88a3d037df2f0ed3f3dece441cc651
-
SHA512
fe736bc87eb71ab29c7ca416cf0a5da3a93c6e18156cb8968f1098d2447f2a9e90a5cad93061a2785b1c616e1fbb88d8266e62a2a9dd8d6075fd46770e1d2519
-
SSDEEP
3072:whoCHG4nqI4hEUbdqvLKVc/VnKnUSamqFwQIc6sABlih:ByyyUbY+VisUSamqFwQIc6sABlih
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
resource yara_rule sample family_mirai -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Mirai family
-
Mirai_x86corona family
Files
-
5d7a6b3f89a97ff4149ec4469b49d1e9bd88a3d037df2f0ed3f3dece441cc651.elf linux x86