Behavioral task
behavioral1
Sample
6f3a8d9d70998f0d35bf98a1f4100cf5
Resource
ubuntu1804-amd64-en-20211208
1 signatures
150 seconds
General
-
Target
6f3a8d9d70998f0d35bf98a1f4100cf5
-
Size
56KB
-
MD5
6f3a8d9d70998f0d35bf98a1f4100cf5
-
SHA1
82f68967021942a9c3c83094a6cbc4306e6d2263
-
SHA256
51b969c23bd589abcb26a558800f14c2c7d1669e72efaf90744b7a8ff1918e28
-
SHA512
d6de061e134b9fb0da592c1d42604f70e3c6a6dbd79877d24c7ac51a76703efad516734e23dd8b5505200f87e59724d0564bed10a971c8acdd391117aba7c76a
-
SSDEEP
1536:2UlST6BhDQ1urWdeRyBTvPQgqLLQdqrg4wbZn+:FSWBVyurvABTwgq4dqrg4wbZn+
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
Processes:
resource yara_rule sample family_mirai -
Mirai family
-
Mirai is a prevalent Linux malware infecting exposed network devices 1 IoCs
Detected Mirai Linux malware
Processes:
resource yara_rule sample elf_mirai_auto
Files
-
6f3a8d9d70998f0d35bf98a1f4100cf5.elf linux x64