Behavioral task
behavioral1
Sample
skid.x86-20220815-1256
Resource
ubuntu1804-amd64-en-20211208
ubuntu-18.04-amd64
3 signatures
150 seconds
General
-
Target
skid.x86-20220815-1256
-
Size
57KB
-
MD5
50ea43103c2f9791d05c0a9c75b235a9
-
SHA1
e5dac3fe73a1fcaaf1d36a81ce7368192d77136f
-
SHA256
4281cc9ffaf7a3329efcf62ad231e4b96374406e44ece5dde09873984a0cc647
-
SHA512
481861c9d7af10060511d260c69f7656d2f8a515d4378223caff57c09bb7d3dab627fb22ffe2d1d97d47d08080bb67d79bbffc800513b25e0a43403b28d63eaa
-
SSDEEP
1536:BF14yTUx6Ahc+IOROP9PqEqRaSblcMUiBVFrVsBwbZnm:B/4yTUxdzIOgP9/qRt5cMlrH2wbZnm
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
resource yara_rule sample family_mirai -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Mirai family
-
Mirai is a prevalent Linux malware infecting exposed network devices 1 IoCs
Detected Mirai Linux malware
resource yara_rule sample elf_mirai_auto -
Mirai_x86corona family
Files
-
skid.x86-20220815-1256.elf linux x86