Behavioral task
behavioral1
Sample
60667cc72527f3679be509cfa612fc0738e8670a5fbecf881387c692d7bc100d
Resource
ubuntu1804-amd64-en-20211208
0 signatures
150 seconds
General
-
Target
60667cc72527f3679be509cfa612fc0738e8670a5fbecf881387c692d7bc100d
-
Size
67KB
-
MD5
c11f690e97cd4b2f6b7933a603e4cd4b
-
SHA1
8e4e05548a571f185a987d49c41ea9f09137081f
-
SHA256
60667cc72527f3679be509cfa612fc0738e8670a5fbecf881387c692d7bc100d
-
SHA512
1dd82efe6967996e99ec4e699693b89e515c8b798f9e2aab2f9bca42086cb20c9a3b99bc03fe065d2c4cc473d757726d75dc49d9adea36295e38dd2e5589f8ca
-
SSDEEP
1536:n28bQEmDIdV5LTepgWncXyqolDmF+l2OZ/fufYEZ:hbQEmDI1LeNcbYmEl2OZXufYEZ
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
Processes:
resource yara_rule sample family_mirai -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
Processes:
resource yara_rule sample family_mirai_x86corona -
Mirai family
-
Mirai_x86corona family
Files
-
60667cc72527f3679be509cfa612fc0738e8670a5fbecf881387c692d7bc100d.elf linux x86