Behavioral task
behavioral1
Sample
1792a888a66342897808422e4b5e468a
Resource
ubuntu1804-amd64-en-20211208
ubuntu-18.04-amd64
2 signatures
150 seconds
General
-
Target
1792a888a66342897808422e4b5e468a
-
Size
105KB
-
MD5
1792a888a66342897808422e4b5e468a
-
SHA1
68575319b4422236c9c2b65568984f9aa963df82
-
SHA256
daf477a0e795231e5b581db4762e13780d13dccc17003c36315c7543253784d3
-
SHA512
a9d3458fb85998efea41568902eee543a9023ea8a4d5358adb631d9af04c8324333ac03cf250a7ad530580ad0fb17482709f637e5a1adc3bb7c9ed014ea1139d
-
SSDEEP
3072:7e/9pXsh9Ke5TB9xV4SW7V/CC3+OxPh0jxKp4PPW:m9pXY95Dxgpz0syPPW
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
resource yara_rule sample family_mirai -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Mirai family
-
Mirai is a prevalent Linux malware infecting exposed network devices 1 IoCs
Detected Mirai Linux malware
resource yara_rule sample elf_mirai_auto -
Mirai_x86corona family
Files
-
1792a888a66342897808422e4b5e468a.elf linux x86