Behavioral task
behavioral1
Sample
x86
Resource
ubuntu1804-amd64-en-20211208
ubuntu-18.04-amd64
2 signatures
150 seconds
General
-
Target
x86
-
Size
44KB
-
MD5
84706ec2c5859ee83c98213cc202ae6a
-
SHA1
d7e072bb5371c9163e72edb14ccc831a2a173e56
-
SHA256
67e6d996ee313de3cb597c2480135bfbf21a953d7fb59820f148eeafe6004052
-
SHA512
aef4ed30d38d60b75de0ce6863157e976eeb48611209ba31c09b2f0e9e38be45b891dfe8ec9c29b40e52512c01801b1365839507acf3adfd6dd2349ff34a1659
-
SSDEEP
768:WUxdSUOUZT7xeC/WElcRqLoNFEqR/uVfdZLEZFAWKzLo:WUxdSUOIT7x3+EK58qgVf/LEZF5KzLo
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
Processes:
resource yara_rule sample family_mirai -
Mirai family
-
Mirai is a prevalent Linux malware infecting exposed network devices 1 IoCs
Detected Mirai Linux malware
Processes:
resource yara_rule sample elf_mirai_auto
Files
-
x86.elf linux x86