Behavioral task
behavioral1
Sample
f9049309b62e9da2fe351a89ece1222fd468d68b720b8be9cb6d47824e3f7fbb
Resource
ubuntu1804-amd64-en-20211208
ubuntu-18.04-amd64
0 signatures
150 seconds
General
-
Target
f9049309b62e9da2fe351a89ece1222fd468d68b720b8be9cb6d47824e3f7fbb
-
Size
70KB
-
MD5
b530ecd262db03f16fe800147cb10871
-
SHA1
16606818ca98a13e70dbdf37c9a3468c1cb84610
-
SHA256
f9049309b62e9da2fe351a89ece1222fd468d68b720b8be9cb6d47824e3f7fbb
-
SHA512
ef58c252a1b6f5bf7ae0a2967dfe5f4ae7650bb0800a5f6f59d55888453c291c578013abdff6ce8b90eba921809f16310d797756662e3feed3e16b17a3be4e29
-
SSDEEP
1536:T7Y0MD/NQ27qLfEg8ZW087vZPmF+lVOCjUxfg71:w0MD/C2GLfcsbjZPmElVOCAxfg71
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
resource yara_rule sample family_mirai -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Mirai family
-
Mirai_x86corona family
Files
-
f9049309b62e9da2fe351a89ece1222fd468d68b720b8be9cb6d47824e3f7fbb.elf linux x86