Behavioral task
behavioral1
Sample
d4bc95ac14b1df9d7eeba43cc71195a37da79c5e1c8e229cdc4968349f22ceef
Resource
ubuntu1804-amd64-en-20211208
ubuntu-18.04-amd64
0 signatures
150 seconds
General
-
Target
d4bc95ac14b1df9d7eeba43cc71195a37da79c5e1c8e229cdc4968349f22ceef
-
Size
75KB
-
MD5
2ff713c34fd08ea088554c0745ca0282
-
SHA1
7deb0f212d8956a274c83cb00063ec35da301831
-
SHA256
d4bc95ac14b1df9d7eeba43cc71195a37da79c5e1c8e229cdc4968349f22ceef
-
SHA512
c3dd880f836527f7dae33ef86ec5db5bfbc68b07300c071a638f86a94e8b3c166f617ddcd5dd9a5bbcd80581f36624b117d22e8c486921bfce31be8e9dbb2bff
-
SSDEEP
1536:CSxY0G1MFZY06cHsX6pCKSt+U2PZtsOutt4LddimF+oVcxjnxj5a1:ZxC1wScHY68PwZtHhnimEoVcxjxj5a1
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
resource yara_rule sample family_mirai -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Mirai family
-
Mirai_x86corona family
Files
-
d4bc95ac14b1df9d7eeba43cc71195a37da79c5e1c8e229cdc4968349f22ceef.elf linux x86