Behavioral task
behavioral1
Sample
botx.x86
Resource
ubuntu1804-amd64-en-20211208
ubuntu-18.04-amd64
2 signatures
150 seconds
General
-
Target
botx.x86
-
Size
50KB
-
MD5
5db5ba6d8391b960e4f237b778713f6b
-
SHA1
91b20fc2835da5fbd26c7374a566920b36d82818
-
SHA256
7ca7b2a257242b6e69e760a3a3cef351a98c788d8e3bda120cfdd06d11e90830
-
SHA512
404bcc879bc7cf1ebcc45c610b616573a122aaf535fa91db0d90816cb3a1fb42db0b7a20e1067d26a408b8368d7c0a3623630931aab281eab051d3260cc7d28e
-
SSDEEP
768:ytYRSjaQ9DaZ/oJQExakbMqu8iUFkvKy+hxluTm/4RsvKQLDJWgMjz:WYRSjaCu1wQPcFly+hbuq/4G3LNWgMv
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
Processes:
resource yara_rule sample family_mirai -
Mirai family
-
Mirai is a prevalent Linux malware infecting exposed network devices 1 IoCs
Detected Mirai Linux malware
Processes:
resource yara_rule sample elf_mirai_auto
Files
-
botx.x86.elf linux x86