Behavioral task
behavioral1
Sample
1beaa289a2e5c583a8ade22549a87e45
Resource
ubuntu1804-amd64-en-20211208
ubuntu-18.04-amd64
0 signatures
150 seconds
General
-
Target
1beaa289a2e5c583a8ade22549a87e45
-
Size
79KB
-
MD5
1beaa289a2e5c583a8ade22549a87e45
-
SHA1
7dcf5380b1d43e2fd3d15e32373edd635427229c
-
SHA256
63992f68aa03ce566fb5d9cbab680a1c3e04ef381081b51f219461da771cba62
-
SHA512
cd326a02bb78fead685b918fb0b3971eb3bbef184683991d3a34c51cbe5c22033d948f24b78debfe5eb9f200ad4c5a1757da75bc07bff13f0d075cb692ef2774
-
SSDEEP
1536:nZg6Iau23kSyBep6OAfgeSvxfbVmYjztrJ//euxUqT4pffSYrJYJa:Vl3H+ep6OAfge2xfbVm8Brp/7x1cfXVj
Score
10/10
Malware Config
Signatures
-
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Mirai family
-
Mirai is a prevalent Linux malware infecting exposed network devices 1 IoCs
Detected Mirai Linux malware
resource yara_rule sample elf_mirai_auto -
Mirai_x86corona family
Files
-
1beaa289a2e5c583a8ade22549a87e45.elf linux x86