Behavioral task
behavioral1
Sample
9db65f0323bf2b3134f4f34dd33f4f768d8872d7d1bd53e7fe0287d03081baab
Resource
ubuntu1804-amd64-en-20211208
2 signatures
150 seconds
General
-
Target
9db65f0323bf2b3134f4f34dd33f4f768d8872d7d1bd53e7fe0287d03081baab
-
Size
70KB
-
MD5
b478f89aefa980382f87ba468ef3ef65
-
SHA1
101ce97643a5fc4a7809ec1b3562f122f43e87c2
-
SHA256
9db65f0323bf2b3134f4f34dd33f4f768d8872d7d1bd53e7fe0287d03081baab
-
SHA512
66e5829c1aec6370f6183c751edf0f983b1a250b4d6009d988c2909af077f87ed3cfbdb26ab435baa93f0ae0c3d53d42bc45f2369f27156ffa8d28caada21077
-
SSDEEP
1536:uFO1oT3cDl7SoEtraqWsIC80c3uAW4hultZXq:uFOO3cD9SoECBC80c3uB4h8q
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
resource yara_rule sample family_mirai -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Mirai family
-
Mirai_x86corona family
Files
-
9db65f0323bf2b3134f4f34dd33f4f768d8872d7d1bd53e7fe0287d03081baab.elf linux x86