Behavioral task
behavioral1
Sample
bb0b00438aa782f41a02b434f2c525f2d4a4662604e4254dca8c6a896adaff3a
Resource
ubuntu1804-amd64-en-20211208
ubuntu-18.04-amd64
0 signatures
150 seconds
General
-
Target
bb0b00438aa782f41a02b434f2c525f2d4a4662604e4254dca8c6a896adaff3a
-
Size
66KB
-
MD5
9d07ffd96e55394b7b7ef73c3408c2db
-
SHA1
df27a3dee18aaf94106ee10d5fcb049ec665aca0
-
SHA256
bb0b00438aa782f41a02b434f2c525f2d4a4662604e4254dca8c6a896adaff3a
-
SHA512
37ecb0ba1e6534b12f89e5294e17f3696d10bb3c27b0a828c9a25a1f9f503da8a31a3d8463c30d234f3044f2dead0cd74f0fa516d8f22246ade616d17a821b14
-
SSDEEP
1536:geJiIWyswGxwbfc/yVtmKSc1D+PXLjJ70mv7PtKOM23mng2c:gYcp/3/yVA/2+P750mzPtKOV3mng2c
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
resource yara_rule sample family_mirai -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Mirai family
-
Mirai_x86corona family
Files
-
bb0b00438aa782f41a02b434f2c525f2d4a4662604e4254dca8c6a896adaff3a.elf linux x86