Behavioral task
behavioral1
Sample
7b8131c708c857d6ffb4aed5b6634806d973b339b49a62a2d968aaf912754e44
Resource
ubuntu1804-amd64-en-20211208
2 signatures
150 seconds
General
-
Target
7b8131c708c857d6ffb4aed5b6634806d973b339b49a62a2d968aaf912754e44
-
Size
39KB
-
MD5
5c471cceb14c1ea20a00f131979a64c7
-
SHA1
ecc2cee68aa67b2f5ba0929df853cdc6dffc0adf
-
SHA256
3e9a303b915270016a60da0449faf63c4183ae5a68c829cfac6c9d5d081ff481
-
SHA512
592bb7c5d7141ac713cd15a7523f4dc7370a847f09b776fd482704ec3d032ed711b7f5c09d07f4b4c956df744c75381f18e7aaa3464a6dea99399c3141a49948
-
SSDEEP
768:UGh6ZU0lXa2dSEbASFVY9KnEzlHhdst+na0RY9+ZwnyDkyHz2:zhAJdSEbXYAEzJswna0Rg+ZeapS
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
resource yara_rule static1/unpack001/7b8131c708c857d6ffb4aed5b6634806d973b339b49a62a2d968aaf912754e44 family_mirai -
Mirai family
-
Mirai is a prevalent Linux malware infecting exposed network devices 1 IoCs
Detected Mirai Linux malware
resource yara_rule static1/unpack001/7b8131c708c857d6ffb4aed5b6634806d973b339b49a62a2d968aaf912754e44 elf_mirai_auto
Files
-
7b8131c708c857d6ffb4aed5b6634806d973b339b49a62a2d968aaf912754e44.zip
-
7b8131c708c857d6ffb4aed5b6634806d973b339b49a62a2d968aaf912754e44.elf linux x64