Behavioral task
behavioral1
Sample
96dd9d1a4195bc85c83abfb677048f955ec5c8c30866054357f40eed83b9b4ba
Resource
ubuntu1804-amd64-en-20211208
ubuntu-18.04-amd64
0 signatures
150 seconds
General
-
Target
96dd9d1a4195bc85c83abfb677048f955ec5c8c30866054357f40eed83b9b4ba
-
Size
67KB
-
MD5
ab0ad24cdabdac84aafd72af4e7f5a81
-
SHA1
d483d2c137d50da0668dc79295c906c0160a68b2
-
SHA256
96dd9d1a4195bc85c83abfb677048f955ec5c8c30866054357f40eed83b9b4ba
-
SHA512
4a811942a37209a8120418daa6db6976b4e7bcbfd9655e32b0fde0638e38e9d0d3e9c50d05d3a75d4e9c10da42b71ddbffc053cbcb1c6a757c923222dfa54a3c
-
SSDEEP
1536:5w8bIEmDIdV5LTepgWncXy/olDmF+l2OZ/fufYEZ:tbIEmDI1LeNcaYmEl2OZXufYEZ
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
resource yara_rule sample family_mirai -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Mirai family
-
Mirai_x86corona family
Files
-
96dd9d1a4195bc85c83abfb677048f955ec5c8c30866054357f40eed83b9b4ba.elf linux x86