Behavioral task
behavioral1
Sample
948d83f2ff73e9796b17d0dd7901dfeeca6cb16b947c4eb5d8e78ee9c4c6625f
Resource
ubuntu1804-amd64-en-20211208
ubuntu-18.04-amd64
0 signatures
150 seconds
General
-
Target
948d83f2ff73e9796b17d0dd7901dfeeca6cb16b947c4eb5d8e78ee9c4c6625f
-
Size
109KB
-
MD5
0039fa68aa4e3beda16c386d29b62451
-
SHA1
0c59351012d0e2f131204d5536d46632bf27de7e
-
SHA256
948d83f2ff73e9796b17d0dd7901dfeeca6cb16b947c4eb5d8e78ee9c4c6625f
-
SHA512
bd3fd3b6e1bcf6f635d5c22f665b80ddbabb125a11464beb32bc6d60e597fa8a2a3ea35f46a99fe91a4d9fbb4e1d959fd0e24c04bd67ded3f3734fe29392eabc
-
SSDEEP
3072:AqZQWW7L3a0ez72xcldhQi0emZ901XGXg9Px:F6WWiVSxcldEemZ901XGXg9Px
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
resource yara_rule sample family_mirai -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Mirai family
-
Mirai_x86corona family
Files
-
948d83f2ff73e9796b17d0dd7901dfeeca6cb16b947c4eb5d8e78ee9c4c6625f.elf linux x86