Behavioral task
behavioral1
Sample
fef2db690a73c2cae6dcc557d7002a4f229fed283e79ad7f3f15f30b77ed80d0.bin
Resource
ubuntu1804-amd64-en-20211208
4 signatures
150 seconds
General
-
Target
fef2db690a73c2cae6dcc557d7002a4f229fed283e79ad7f3f15f30b77ed80d0.bin
-
Size
53KB
-
MD5
246a18bb6c822b35659639c9ddb2669a
-
SHA1
e77cfebd3717a0a070061742e0d2b0af815e8bb6
-
SHA256
fef2db690a73c2cae6dcc557d7002a4f229fed283e79ad7f3f15f30b77ed80d0
-
SHA512
14133b977b003a9e1014b6dac0f46b3a837f2f75dce5319baa8973ace00fa4b9f17880b0260549c2b3c6659aedddeea15faa28ff4c887946161f0d27419d112b
-
SSDEEP
1536:VJCqjbwNRaPq5FllaxwOzvTMToao9J6Ev:FjEraP4llaxwITMT3mJ6E
Score
10/10
Malware Config
Signatures
-
Mirai family
-
Mirai is a prevalent Linux malware infecting exposed network devices 1 IoCs
Detected Mirai Linux malware
resource yara_rule sample elf_mirai_auto
Files
-
fef2db690a73c2cae6dcc557d7002a4f229fed283e79ad7f3f15f30b77ed80d0.bin.elf linux x64