Behavioral task
behavioral1
Sample
5d5f8b47e43db31a3a024a48eb7b6c65f668e8fe1160c2c57c16ca5b7e68c831
Resource
ubuntu1804-amd64-en-20211208
ubuntu-18.04-amd64
0 signatures
150 seconds
General
-
Target
5d5f8b47e43db31a3a024a48eb7b6c65f668e8fe1160c2c57c16ca5b7e68c831
-
Size
113KB
-
MD5
3e5e0d8648db4dbac083b6d98ab27055
-
SHA1
cec24bdf7f83c46d3aab451dac9d0f0b4b8fa026
-
SHA256
5d5f8b47e43db31a3a024a48eb7b6c65f668e8fe1160c2c57c16ca5b7e68c831
-
SHA512
be386a937bca485c7f9712b19e86a4bb27e18782564c27eebe6a5319b9def04b3c029d10edf8e60688a23d10acbde8ebea365224904a29a19d278e3e47567a64
-
SSDEEP
3072:Qvzla/zS8QUGzBXaxntk/TBWFpA1t+Z0Ua3hgp6W:f/zS8dgYjGTBgpst+Z0Ua3hgp6W
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
resource yara_rule sample family_mirai -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Mirai family
-
Mirai_x86corona family
Files
-
5d5f8b47e43db31a3a024a48eb7b6c65f668e8fe1160c2c57c16ca5b7e68c831.elf linux x86