Behavioral task
behavioral1
Sample
137d952bfa9f41197afae6f53d241acebb17f8e4251d106036780be6c700452e.bin
Resource
ubuntu1804-amd64-en-20211208
ubuntu-18.04-amd64
3 signatures
150 seconds
General
-
Target
137d952bfa9f41197afae6f53d241acebb17f8e4251d106036780be6c700452e.bin
-
Size
61KB
-
MD5
9b1d7b811cf47f13441217908a34add5
-
SHA1
6ea14504f14a8cf9c7d5b9566f3198a882043444
-
SHA256
137d952bfa9f41197afae6f53d241acebb17f8e4251d106036780be6c700452e
-
SHA512
5d89195c43b4a604e4b560b035fa8c99193619f48c4859efdc940adb1e69c09c255027d0719411543a3d7cf1c36b10f71edca5fd0c1e38403611692cafcd31d1
-
SSDEEP
1536:sSHQn+Vs33q+5/yLxlvq9+Km2HqEvsUrn2f:XHQn+Ve15KLx5qG2KusA2f
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
resource yara_rule sample family_mirai -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Mirai family
-
Mirai is a prevalent Linux malware infecting exposed network devices 1 IoCs
Detected Mirai Linux malware
resource yara_rule sample elf_mirai_auto -
Mirai_x86corona family
Files
-
137d952bfa9f41197afae6f53d241acebb17f8e4251d106036780be6c700452e.bin.elf linux x86