Behavioral task
behavioral1
Sample
5d46f3b2dfb00cc97da5e26e7ea3c503dc1aec5e8ab2fcc0f5147a1cbf98b817
Resource
ubuntu1804-amd64-en-20211208
ubuntu-18.04-amd64
0 signatures
150 seconds
General
-
Target
5d46f3b2dfb00cc97da5e26e7ea3c503dc1aec5e8ab2fcc0f5147a1cbf98b817
-
Size
109KB
-
MD5
157ec58b126fadf529996f98e9783c3e
-
SHA1
5a48d552ea6dbae2690d16f17e358203b715ef48
-
SHA256
5d46f3b2dfb00cc97da5e26e7ea3c503dc1aec5e8ab2fcc0f5147a1cbf98b817
-
SHA512
7efa6017450d9023962eca730a918d96e07441de58a7a685ab52b393b5a830d15a3560b560ee3658ac64b3d1a3a1c39e2e81cccaa5d435e9bc2ae171056fa2a1
-
SSDEEP
3072:yhMeHjtvX9ogEM5dhQSEJ0cEo7mZ901XGXg9Px:yFLtEM5dAJzpmZ901XGXg9Px
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
resource yara_rule sample family_mirai -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Mirai family
-
Mirai_x86corona family
Files
-
5d46f3b2dfb00cc97da5e26e7ea3c503dc1aec5e8ab2fcc0f5147a1cbf98b817.elf linux x86