Behavioral task
behavioral1
Sample
338a6ef8c0c18a6d5610cd9d18aefb3a
Resource
ubuntu1804-amd64-en-20211208
0 signatures
150 seconds
General
-
Target
338a6ef8c0c18a6d5610cd9d18aefb3a
-
Size
89KB
-
MD5
338a6ef8c0c18a6d5610cd9d18aefb3a
-
SHA1
3f937766b03a3986a0cccfa6f199a4a1b3629e4d
-
SHA256
7a89a99979e9e9494104d27d486aba5c6d8381c149dfb067cdd245dbcbf1a328
-
SHA512
39657d6e4e9791653fb40acb69435ba7c121332d4b34edbf7f94785d6cae615042ca613e7a9aa1bd4604a7929abe285f4ce1931cb3bab3691ae00b790c5600a5
-
SSDEEP
1536:j7lyW95LQG9SH8/sYrAIwEWPm7GUv0EqaTYRJLWjd2ZOqnJ33xZA0gA:XfJBsYrAIum7csY/WJmJ3BZAX
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
resource yara_rule sample family_mirai -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Mirai family
-
Mirai_x86corona family
Files
-
338a6ef8c0c18a6d5610cd9d18aefb3a.elf linux x86