Behavioral task
behavioral1
Sample
39ecb85296b4efed82c1a0961d0227ad.elf
Resource
ubuntu1804-amd64-en-20211208
ubuntu-18.04-amd64
2 signatures
150 seconds
General
-
Target
39ecb85296b4efed82c1a0961d0227ad.elf
-
Size
47KB
-
MD5
39ecb85296b4efed82c1a0961d0227ad
-
SHA1
6c4e5ce79d707a880309e122b2c2628204b5f647
-
SHA256
63fdcbc4c601b1d506d420510379882e717966e9739e3c8d0e040df6093bc180
-
SHA512
17e4cf4b9028f05ff1f8acaa32bebd73c7bbe8bdf793fafeed9468bc0cf140add475c7f4b13de54c6eb491c92df2e0ae9bc384b0ddf0a9dde55003f5587ce1ef
-
SSDEEP
768:KgtmwTPL4dKYWUTeRCiAUTvqRI3HRampwEvBIUIYpKil1aVdcS:lt7z8JWnCATvR3HR1BF705cS
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
resource yara_rule sample family_mirai -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Mirai family
-
Mirai_x86corona family
Files
-
39ecb85296b4efed82c1a0961d0227ad.elf.elf linux x86