Behavioral task
behavioral1
Sample
5d43ccacdba33da2fc646bb565ddec37d88a14d043a472938e15b1842d629c4c
Resource
ubuntu1804-amd64-en-20211208
ubuntu-18.04-amd64
0 signatures
150 seconds
General
-
Target
5d43ccacdba33da2fc646bb565ddec37d88a14d043a472938e15b1842d629c4c
-
Size
70KB
-
MD5
239ace375d103e672ff6c5ecc0209781
-
SHA1
5700e384737c75dbf179e0b703dd16887300238f
-
SHA256
5d43ccacdba33da2fc646bb565ddec37d88a14d043a472938e15b1842d629c4c
-
SHA512
f7df21780b684f901fa9c20eb7c94a59463c784cee5bfc38b940a9f198d4d354eab5586b86455f0b45fefcdc3c3058f04065133d454e77078861df63713a6e5e
-
SSDEEP
1536:h2aBNtoEV8+494o9nlmqe8ThfZ9iYSggmd+lVOCjUxfg71:h2iDo4DeVplLFfzVSggmMlVOCAxfg71
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
resource yara_rule sample family_mirai -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Mirai family
-
Mirai_x86corona family
Files
-
5d43ccacdba33da2fc646bb565ddec37d88a14d043a472938e15b1842d629c4c.elf linux x86