Behavioral task
behavioral1
Sample
a6a2b03e264830a6c17599b14c4a45af.elf
Resource
ubuntu1804-amd64-en-20211208
2 signatures
150 seconds
General
-
Target
a6a2b03e264830a6c17599b14c4a45af.elf
-
Size
57KB
-
MD5
a6a2b03e264830a6c17599b14c4a45af
-
SHA1
a8e0077434440cb619b42a1771900adeab5131c0
-
SHA256
d4cb1da38b4d34617ada0138bd8463cdf4a3a8cfd947c77c34562c38a82b1571
-
SHA512
ae27924fb03d6e5188363c3ab0986aec617c9fb6ddea4bfe978f23201bc8f8a34cadcd5a9735476c4b8571693c06fb1c09c1f9d7195bdffb5111f5ff07f3323b
-
SSDEEP
1536:HZUGpyPfASX6tnB4eYWtoI/aCljipR5DBHxPB7mS/:HZU+wfASX4aeYrSZGpvDJr73
Score
10/10
Malware Config
Signatures
-
Mirai family
-
Mirai is a prevalent Linux malware infecting exposed network devices 1 IoCs
Detected Mirai Linux malware
resource yara_rule sample elf_mirai_auto
Files
-
a6a2b03e264830a6c17599b14c4a45af.elf.elf linux x86