Behavioral task
behavioral1
Sample
skid.x86
Resource
ubuntu1804-amd64-en-20211208
ubuntu-18.04-amd64
3 signatures
150 seconds
General
-
Target
skid.x86
-
Size
53KB
-
MD5
357ae09836eec7a0d0992be3ab1368d7
-
SHA1
e43d4ff7bc11e6180c0fa2b1a73670e403238c78
-
SHA256
af14fcbcf9c5f8f68c25ee485a35ebd87f720009f080377cb4323324a728b83f
-
SHA512
9db6ad90ee3de194a4e3feab4db22f921ed88b07741204211efba5f47354dfe70412927496a7923a4514eb85d61f1d4f9ce0597c742156bdcce740ba76d05f7a
-
SSDEEP
1536:KkjzqAl9JnIZvmJ3D2pQxAxIR/4TTrRBwbZnG:KkjzqQT8mBD2CxwmATLwbZnG
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
resource yara_rule sample family_mirai -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Mirai family
-
Mirai is a prevalent Linux malware infecting exposed network devices 1 IoCs
Detected Mirai Linux malware
resource yara_rule sample elf_mirai_auto -
Mirai_x86corona family
Files
-
skid.x86.elf linux x86