Behavioral task
behavioral1
Sample
5b6f055b94a52ab9b2b73d13caf91ea74f3fe0d761750fac1380de9a874f0f17
Resource
ubuntu1804-amd64-en-20211208
ubuntu-18.04-amd64
0 signatures
150 seconds
General
-
Target
5b6f055b94a52ab9b2b73d13caf91ea74f3fe0d761750fac1380de9a874f0f17
-
Size
113KB
-
MD5
1a4d92e2cfabdc290d4be296a77b2a7d
-
SHA1
d805883653c55e4b9df40eaec3b2a8ee7a8e3597
-
SHA256
5b6f055b94a52ab9b2b73d13caf91ea74f3fe0d761750fac1380de9a874f0f17
-
SHA512
2fc06460256841c422776c0b1396653190ba710c2c043bb13ea5905f87b778813d3ef4ba86e18e6d39efa5d58cc0f2ef2bfc270e7de3e53ee044dd0cd4f1ab58
-
SSDEEP
3072:Q7Lla/zS8QUGz1Xaxntk/TBSFRA1t+Z0Ua3hgp6W:j/zS8dg0jGTBsRst+Z0Ua3hgp6W
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
resource yara_rule sample family_mirai -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Mirai family
-
Mirai_x86corona family
Files
-
5b6f055b94a52ab9b2b73d13caf91ea74f3fe0d761750fac1380de9a874f0f17.elf linux x86