Behavioral task
behavioral1
Sample
841aab522564ba978d8a81bb1fca005dfc7f477037bfb5499749df3ea4189aef
Resource
ubuntu1804-amd64-en-20211208
0 signatures
150 seconds
General
-
Target
841aab522564ba978d8a81bb1fca005dfc7f477037bfb5499749df3ea4189aef
-
Size
70KB
-
MD5
3b8ca533236d7aa1a5ee06aac5aaca7c
-
SHA1
c57f1fed9ad3454b4e27cdf3b3322656ab800636
-
SHA256
841aab522564ba978d8a81bb1fca005dfc7f477037bfb5499749df3ea4189aef
-
SHA512
a32bc2b44d395b0dfb31ce4d0858465b7b8e252d7d088b04b42bf24870449f6a95eff13c9cf065226ff2242bbdebf712f901d778832e63161723ce9d8a2fc9e0
-
SSDEEP
1536:wuaBNnGQEV8+494o9nlmqe8ThfZ9i2Sggmd+lVOCjUxfg71:wuiAQ4DeVplLFfzHSggmMlVOCAxfg71
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
resource yara_rule sample family_mirai -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Mirai family
-
Mirai_x86corona family
Files
-
841aab522564ba978d8a81bb1fca005dfc7f477037bfb5499749df3ea4189aef.elf linux x86