Behavioral task
behavioral1
Sample
4c4edb370a7b3c93e314f833a5eff11c.elf
Resource
ubuntu1804-amd64-en-20211208
2 signatures
150 seconds
General
-
Target
4c4edb370a7b3c93e314f833a5eff11c.elf
-
Size
150KB
-
MD5
4c4edb370a7b3c93e314f833a5eff11c
-
SHA1
0cb269317216e525d8184e3688104667b59fd2a2
-
SHA256
7f6dc0053d4642df233850287f9b12d70a8314fa7be35db392c115e93e45ef06
-
SHA512
1dd6d2fce8fe22092169241fc53cfd2835de980e9ea1b6f5831f767b4158f55db4275d68de63032ba6e93bff836771fbdbca859f994203b1835676c890f767d8
-
SSDEEP
3072:YUBUF0jr0M8t+ZbRniEHwvk2oskfUe0I:Yms0jr0M8t+Z99y7ez
Score
10/10
Malware Config
Extracted
Family
mirai
C2
564sfacnc.duckdns.org
Signatures
-
Detect Mirai payload 1 IoCs
resource yara_rule sample family_mirai -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Mirai family
-
Mirai_x86corona family
Files
-
4c4edb370a7b3c93e314f833a5eff11c.elf.elf linux x86