Behavioral task
behavioral1
Sample
skid.x86-20220818-1128
Resource
ubuntu1804-amd64-en-20211208
ubuntu-18.04-amd64
1 signatures
150 seconds
General
-
Target
skid.x86-20220818-1128
-
Size
58KB
-
MD5
2c21a8a7c9cf74bcf5b21194bb7fcce4
-
SHA1
45e35c8e2ef04e5428e34c130542b23bd5532193
-
SHA256
a3d6cd2a877597e1bef369fdb53f4a32683f33c888ef160c724acc0ff5ffbf3a
-
SHA512
5551576753ae029b730cf9770563e89a691355518ebcf153389e0921f10c1b3de5f0587a5acc150241fd5d3ce3d9eed503f848e18649e757797b2a0d769efc8c
-
SSDEEP
1536:iWASAew8hZ+WjIjDZGDbQTLm12Fs7tmGrH/H:iWASAZinjIjDZG/QTi10sxm6/H
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
resource yara_rule sample family_mirai -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Mirai family
-
Mirai is a prevalent Linux malware infecting exposed network devices 1 IoCs
Detected Mirai Linux malware
resource yara_rule sample elf_mirai_auto -
Mirai_x86corona family
Files
-
skid.x86-20220818-1128.elf linux x86