Analysis
-
max time kernel
12184s -
max time network
153s -
platform
ubuntu-18.04_amd64 -
resource
ubuntu1804-amd64-20221111-en -
resource tags
arch:amd64arch:i386image:ubuntu1804-amd64-20221111-enkernel:4.15.0-161-genericlocale:en-usos:ubuntu-18.04-amd64system -
submitted
01/04/2023, 18:41
Behavioral task
behavioral1
Sample
mirai.x86.elf
Resource
ubuntu1804-amd64-20221111-en
3 signatures
150 seconds
General
-
Target
mirai.x86.elf
-
Size
54KB
-
MD5
74e7ad7d7e6afeea7481f63420b25339
-
SHA1
a8d5514fa8dfd944da699868fd311f00b9104179
-
SHA256
b361b04850c738a94e5e3c9e96ac8d8bafd3694d76052688e38a3ad7ab5b9949
-
SHA512
73ff35e04413eefee62016518d1114566238b968a010471b120e85ea5ffa618b3b8303590f05837cba8ad450a3915625da04e42753d6fef6f45e8f7dd5b97d32
-
SSDEEP
1536:d6Ew9WqbZKWzp1reXfez10AWCTZVZt+xc:Q9WgZKWz34s10AWoZVZQq
Score
9/10
Malware Config
Signatures
-
Contacts a large (23512) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Writes file to tmp directory 1 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process /tmp/mirai.x86.elf /tmp/mirai.x86.elf mirai.x86.elf