Behavioral task
behavioral1
Sample
189b81a0cc7dc218550c34fbf5e578e2e70c734a271c7668d8aa65f464c5f5e2.bin
Resource
ubuntu1804-amd64-en-20211208
2 signatures
150 seconds
General
-
Target
189b81a0cc7dc218550c34fbf5e578e2e70c734a271c7668d8aa65f464c5f5e2.bin
-
Size
44KB
-
MD5
cb6768de1da9748d1044c6c2fbe10873
-
SHA1
654065bf43d713027e4b7c58c7914768a80b0f97
-
SHA256
189b81a0cc7dc218550c34fbf5e578e2e70c734a271c7668d8aa65f464c5f5e2
-
SHA512
a2ca70cd525a4ca1167639e26bb74b8cb54c51d2b307d0d6e415f5d27ec91b1c43849b1704045df3f0841b2b1b1fbb2d5ec5a68dd50778210054e2bc63bb46b1
-
SSDEEP
768:4725ldb1t4x77LCWESLyRqr7NFKKxRfDnf9ZLE5yAqDKzrXY:4725ldb1t4x7HTES2qiKxZnffLE5ytD7
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
resource yara_rule sample family_mirai -
Mirai family
-
Mirai is a prevalent Linux malware infecting exposed network devices 1 IoCs
Detected Mirai Linux malware
resource yara_rule sample elf_mirai_auto
Files
-
189b81a0cc7dc218550c34fbf5e578e2e70c734a271c7668d8aa65f464c5f5e2.bin.elf linux x86