Behavioral task
behavioral1
Sample
5c4f8e6bb727a35d41b526dc9e97e5c75361c9f55f4b9fbfb4329d2bcde0476f
Resource
ubuntu1804-amd64-en-20211208
ubuntu-18.04-amd64
0 signatures
150 seconds
General
-
Target
5c4f8e6bb727a35d41b526dc9e97e5c75361c9f55f4b9fbfb4329d2bcde0476f
-
Size
79KB
-
MD5
12e3c75b536f95611f2d21c794a2765c
-
SHA1
ebcb6e48d372d854258fd6965d4433f4c1297cbc
-
SHA256
5c4f8e6bb727a35d41b526dc9e97e5c75361c9f55f4b9fbfb4329d2bcde0476f
-
SHA512
3f2da38faf2e021175d100dddceec760b6dd36ec86b37b58adfcdb43966788ed55f88f87f55eb74798ba43a3a6b130826c9958e726f9da35ea0dc9fcd5ac2f5b
-
SSDEEP
1536:KNQyKAd9ddjQ/uRsGyHan2hG8epauzogbBXCAmq8V+LjA4vmF+oVcxjnxjIOO:KNrd9ddjQ/uFEq248epVBX0p+JmEoVco
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
resource yara_rule sample family_mirai -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Mirai family
-
Mirai_x86corona family
Files
-
5c4f8e6bb727a35d41b526dc9e97e5c75361c9f55f4b9fbfb4329d2bcde0476f.elf linux x86