Behavioral task
behavioral1
Sample
3c6d31b289c46b98be7908acd84086653a0774206b3310e0ea4e6779e1ff4124
Resource
ubuntu1804-amd64-en-20211208
ubuntu-18.04-amd64
0 signatures
150 seconds
General
-
Target
3c6d31b289c46b98be7908acd84086653a0774206b3310e0ea4e6779e1ff4124
-
Size
481KB
-
MD5
9d01ddf9eb7ab0a3b627794831103be0
-
SHA1
999299ae28a32f970cae7053ac31e69e5e444b45
-
SHA256
3c6d31b289c46b98be7908acd84086653a0774206b3310e0ea4e6779e1ff4124
-
SHA512
9f16191cc4e120c1a8a2b963d84424f2a996e7ec217c22d5136bd8e905344de0a5eea0ede919e5c73b7967cd222862f693373d994bcc4d67b16e454020a4f513
-
SSDEEP
12288:NcNV0cfFO2psT7siAGB9JDetJ8ayGiQl/wvds+A5AqnbdzP2sRMQE:WFU7d9JDetJ8aVlovds+A5AqnbdzP2sw
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
resource yara_rule sample family_mirai -
Detected Echobot 1 IoCs
resource yara_rule sample family_echobot -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Echobot family
-
Mirai family
-
Mirai_x86corona family
Files
-
3c6d31b289c46b98be7908acd84086653a0774206b3310e0ea4e6779e1ff4124.elf linux x86