Behavioral task
behavioral1
Sample
2093f53b5391028af183120e8c1470c64100bc8942446223a14535f166608f37.bin
Resource
ubuntu1804-amd64-en-20211208
2 signatures
150 seconds
General
-
Target
2093f53b5391028af183120e8c1470c64100bc8942446223a14535f166608f37.bin
-
Size
64KB
-
MD5
71faa2dc1efa82c12e7e814117ed3f07
-
SHA1
e4202ab3d1f4ebc302c83d0bbc3b0e8a4ff6851c
-
SHA256
2093f53b5391028af183120e8c1470c64100bc8942446223a14535f166608f37
-
SHA512
cfee6239d644822c87b3b08ee195de6966f98208190d7b67cc46ad2feb0caa85139e3c0b2586d9fda221263459d6a88a95e6ed01a4687b676d32501a873022e8
-
SSDEEP
1536:Iycq9G7O9vwitb/XZz+aXtEgTTr0USW7V/DjObeFt6PuQ4L:Iq9G7O1witb/XZz+aXqCrBSWZ/XObebZ
Score
10/10
Malware Config
Signatures
-
Mirai family
-
Mirai is a prevalent Linux malware infecting exposed network devices 1 IoCs
Detected Mirai Linux malware
resource yara_rule sample elf_mirai_auto
Files
-
2093f53b5391028af183120e8c1470c64100bc8942446223a14535f166608f37.bin.elf linux x86