Behavioral task
behavioral1
Sample
385db4ce372a20f1e2b9b70045dbb27f
Resource
ubuntu1804-amd64-en-20211208
ubuntu-18.04-amd64
0 signatures
150 seconds
General
-
Target
385db4ce372a20f1e2b9b70045dbb27f
-
Size
89KB
-
MD5
385db4ce372a20f1e2b9b70045dbb27f
-
SHA1
1fb9e86f78ffa0f95d274d533d1d9fc87f5a42f6
-
SHA256
9cb7ab99948f43d321b6782cd0ba3044e3cc886cf2786220ab4c2217603afb01
-
SHA512
f3c38218d0aed9955e17c95cf8120aaa8245b7dda3bba990e0943d6711e21fab92525e86d31d46913aacac2535f6824394426c796248922d7a74d28043e5ab2c
-
SSDEEP
1536:1DsHrBPQNMcbMarLyEeHu7OUvsEyabYB5b2LV2xOqnJ33SZQEgk:ZqqPMarLYu7EEY/2JOJ3iZQn
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
resource yara_rule sample family_mirai -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Mirai family
-
Mirai_x86corona family
Files
-
385db4ce372a20f1e2b9b70045dbb27f.elf linux x86