Behavioral task
behavioral1
Sample
5c932424e5789f8c1644f11c2f9307eb6f84f32e4e4c0ff552a9502669a0ef0d
Resource
ubuntu1804-amd64-en-20211208
ubuntu-18.04-amd64
0 signatures
150 seconds
General
-
Target
5c932424e5789f8c1644f11c2f9307eb6f84f32e4e4c0ff552a9502669a0ef0d
-
Size
72KB
-
MD5
ce7972614983a64ead5de0efab4ac50e
-
SHA1
436c0fe0a001c788f2c211826827f1985d6f741f
-
SHA256
5c932424e5789f8c1644f11c2f9307eb6f84f32e4e4c0ff552a9502669a0ef0d
-
SHA512
1f6b7ef97e651ae1ce41946bee3574c9b229c5dd6637783c9d16340e1788a1c816d6add0f2f5062c3c85929468c5f37a3d79410c2e22aad88600ae56610eff58
-
SSDEEP
1536:veTcLGPwnVjAWnpdHTk4S3um7qasEGWqejaEKEGz2ctxomP+lVrCjmxfZp1:CcLGPwnVjAWnpxvS3um7hPz+E9+omWlJ
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
resource yara_rule sample family_mirai -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Mirai family
-
Mirai_x86corona family
Files
-
5c932424e5789f8c1644f11c2f9307eb6f84f32e4e4c0ff552a9502669a0ef0d.elf linux x86