Behavioral task
behavioral1
Sample
799c32646991a9e5faca71f70b86c7bf
Resource
ubuntu1804-amd64-en-20211208
ubuntu-18.04-amd64
0 signatures
150 seconds
General
-
Target
799c32646991a9e5faca71f70b86c7bf
-
Size
89KB
-
MD5
799c32646991a9e5faca71f70b86c7bf
-
SHA1
867904b944d08071d03d5d3b8f30137e37a3a587
-
SHA256
9f7c58f6e6810c1dbeac762356c0a550b1ae99e64ac65844cc90e4ddc8aa988d
-
SHA512
77e26cca8f163a91156024cfae9c68fc7b21726fcc33335f163b76981bb0eaaabb02b067c1ec3c6fa6dcd13d4a2fa030f903380fd41efd96eb5ba33c3361a5af
-
SSDEEP
1536:N5+k8eQ+hIN2qhbckmjW4w57Vo1EOQryVwCiUH1FVLx8rbrbuqMyu/J33JZme0go:N5lnhg2qh3rRVo1EOLVBiUH1FVLx8rbR
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
resource yara_rule sample family_mirai -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Mirai family
-
Mirai_x86corona family
Files
-
799c32646991a9e5faca71f70b86c7bf.elf linux x86