Behavioral task
behavioral1
Sample
skid.x86-20220815-1818
Resource
ubuntu1804-amd64-en-20211208
ubuntu-18.04-amd64
2 signatures
150 seconds
General
-
Target
skid.x86-20220815-1818
-
Size
57KB
-
MD5
1998520f8468a747f17bd4a20071355c
-
SHA1
2ca0bca13ff6fd626bb7faf115228b34ab8e69e0
-
SHA256
be5105d622c19a52f1f931dbc30e2bd6f4007b205e00435fe98e339562867d44
-
SHA512
2d5dd0dc64bc229590a35b57371b59b647e60729bbdca90d93139087279928b3de7de57cc3156c0156d32bfc1c5c77a49e38badc2f60bd2682ac95c206cd73a6
-
SSDEEP
1536:BF14yTUx6AhcHIOROP9PqEqRaSblcMUiBVFrVsBwbZnm:B/4yTUxdaIOgP9/qRt5cMlrH2wbZnm
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
resource yara_rule sample family_mirai -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Mirai family
-
Mirai is a prevalent Linux malware infecting exposed network devices 1 IoCs
Detected Mirai Linux malware
resource yara_rule sample elf_mirai_auto -
Mirai_x86corona family
Files
-
skid.x86-20220815-1818.elf linux x86