Behavioral task
behavioral1
Sample
skid.x86_64-20220815-1818
Resource
ubuntu1804-amd64-en-20211208
3 signatures
150 seconds
General
-
Target
skid.x86_64-20220815-1818
-
Size
64KB
-
MD5
15dfa70bcba3131201a51a9b7617554c
-
SHA1
7bdd20801fdeb896ca31a85e0b022c5ab8dc3a69
-
SHA256
69c1e1a1c636a7384272d8841e9da38bd8decbb4b14965b7d9c8e3d66ebe8ba5
-
SHA512
e1f497568871fa8f4cb11daf23a9fa9f97f50ea705b745a7ff7ddeebb7da85744f01e097509850dc3cc7a866db64e4034b34e02132088f11d2e5e9a55c79be62
-
SSDEEP
1536:8t7HjUwUhxVwlizBEwUkygBk/jBKPyLkXGugZdufgkGaMiBwbZnlf:A7HAwWjwlvKyMkLBK4kXGugyfgZaMcw/
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
Processes:
resource yara_rule sample family_mirai -
Mirai family
-
Mirai is a prevalent Linux malware infecting exposed network devices 1 IoCs
Detected Mirai Linux malware
Processes:
resource yara_rule sample elf_mirai_auto
Files
-
skid.x86_64-20220815-1818.elf linux x64