Behavioral task
behavioral1
Sample
3a0e9d517e3bebacf9ec2bffd462dd2b
Resource
ubuntu1804-amd64-en-20211208
ubuntu-18.04-amd64
1 signatures
150 seconds
General
-
Target
3a0e9d517e3bebacf9ec2bffd462dd2b
-
Size
49KB
-
MD5
3a0e9d517e3bebacf9ec2bffd462dd2b
-
SHA1
eb4293c2457d2ec39a5354a7bf2968599012691d
-
SHA256
c43fdfd1a54283ead64c29da96721474a6fdc20919d27ebb2042a0bac21fb1a6
-
SHA512
a763f5cde7144809f8745422d6fb4534c6df350899a99b684dddc3cff07cd5abe04b25ed3c60772b1634dcd6dcb57362471df24cdba44278ac27a1a1d9a4dbba
-
SSDEEP
1536:Yi297LqwyBwI9NYfZXQtDF+/JT4onwr7SwbZnG:b297Lq1jNYfdUERconISwbZnG
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
resource yara_rule sample family_mirai -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Mirai family
-
Mirai is a prevalent Linux malware infecting exposed network devices 1 IoCs
Detected Mirai Linux malware
resource yara_rule sample elf_mirai_auto -
Mirai_x86corona family
Files
-
3a0e9d517e3bebacf9ec2bffd462dd2b.elf linux x86