Behavioral task
behavioral1
Sample
e2b4a4f44700031c5df1353371c186fb56ba566968cdcaa50fbdbe9fe64142ce
Resource
ubuntu1804-amd64-en-20211208
ubuntu-18.04-amd64
0 signatures
150 seconds
General
-
Target
e2b4a4f44700031c5df1353371c186fb56ba566968cdcaa50fbdbe9fe64142ce
-
Size
67KB
-
MD5
eb5b9ed84ceb5dffd3cacfd3db8401e8
-
SHA1
1ea6a55a855b0342cb55cd0bfc783dacc0ecd8b0
-
SHA256
e2b4a4f44700031c5df1353371c186fb56ba566968cdcaa50fbdbe9fe64142ce
-
SHA512
d4a65d45918ef215256a29f05953d18680f677e9fde09b6e2414f71642a85ededece3df42155ad46c0e46d142dd6d753f941581a765d35166f2e65aa1f6850e7
-
SSDEEP
1536:5w8bIEmDIdV5LTepgWncXypolDmF+l2OZ/fufYEZ:tbIEmDI1LeNc8YmEl2OZXufYEZ
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
resource yara_rule sample family_mirai -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Mirai family
-
Mirai_x86corona family
Files
-
e2b4a4f44700031c5df1353371c186fb56ba566968cdcaa50fbdbe9fe64142ce.elf linux x86