Behavioral task
behavioral1
Sample
b802a74e6dfaa3cdcc9d2a3e658c1d01
Resource
ubuntu1804-amd64-en-20211208
ubuntu-18.04-amd64
1 signatures
150 seconds
General
-
Target
b802a74e6dfaa3cdcc9d2a3e658c1d01
-
Size
89KB
-
MD5
b802a74e6dfaa3cdcc9d2a3e658c1d01
-
SHA1
e5297b830a8888878b28124f7147a7ceb56cd34e
-
SHA256
5f44c209b97a8e3af578648b408d01b767ef008455233f7485f5ab72bbc3a53a
-
SHA512
4a1b8dfb4ad6b1b8f9c8f3407d97cf5cb302b23c95a9d72aed223a2e35a810b1ab0356f5fe67d42dfc1b33fa3c304b6dfd8003d00e0355738279c51ddb2898e1
-
SSDEEP
1536:N/+k8eK+haN2qRZckmjW4w57Vo1EOQryVwCiUH1FVLx8rbrbuqMyu/J33/ZOu0go:N/lVhq2qRhrRVo1EOLVBiUH1FVLx8rbT
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
resource yara_rule sample family_mirai -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Mirai family
-
Mirai_x86corona family
Files
-
b802a74e6dfaa3cdcc9d2a3e658c1d01.elf linux x86