Behavioral task
behavioral1
Sample
skid.x86-20220819-1656
Resource
ubuntu1804-amd64-en-20211208
3 signatures
150 seconds
General
-
Target
skid.x86-20220819-1656
-
Size
57KB
-
MD5
acb59b95c2b52341166d9907a961ea3b
-
SHA1
27f48e76c12532b4b75c5710143d5245006a7728
-
SHA256
ef402612635d094c1389e837d569924c2bc678aebebf85e0b03db220aad69f80
-
SHA512
0ce656be9f63e0321db003644b0221ac91de1af968654cf0300e8399e2c8a1e5439a85a9a205d943c2dbceccbc74501397270b136ba6d7762596b4d54532acd5
-
SSDEEP
1536:P5AbdXlO2OOUVp5a+A/gAeSox6QNF2Czurhw:P5AbdXlkJVpA/gAezxPrHzgw
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
resource yara_rule sample family_mirai -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Mirai family
-
Mirai is a prevalent Linux malware infecting exposed network devices 1 IoCs
Detected Mirai Linux malware
resource yara_rule sample elf_mirai_auto -
Mirai_x86corona family
Files
-
skid.x86-20220819-1656.elf linux x86