Behavioral task
behavioral1
Sample
skid.x86
Resource
ubuntu1804-amd64-en-20211208
ubuntu-18.04-amd64
3 signatures
150 seconds
General
-
Target
skid.x86
-
Size
75KB
-
MD5
7a48eb95ce3922aed99add8f1e13aa25
-
SHA1
c625730c858c8cb1ced4e99edd2be4ca147d6eb6
-
SHA256
fd3c33e473a0c0ee996b863f99be3aec00e8e78958598e48cb4939c1260fda1e
-
SHA512
74fc4f80f5435a7fdf4c20b6c1cf0e45dd6830aff4f35869ad48ad4ae17379b36883217350e96254e1444d0fb62ff3410f1c9d70ed065fbbbd86caaecbbead86
-
SSDEEP
1536:uTkZRnkGO6VLZ5nnuaYF6VBKEFiG+PIMWsBTBfw2/OhC1KUdLwbZnF:u4POofnnrYFUkEFHMWIT62/r1KUVwbZF
Score
10/10
Malware Config
Signatures
-
Mirai family
-
Mirai is a prevalent Linux malware infecting exposed network devices 1 IoCs
Detected Mirai Linux malware
Processes:
resource yara_rule sample elf_mirai_auto
Files
-
skid.x86.elf linux x64