Behavioral task
behavioral1
Sample
skid.x86_64-20220820-1520
Resource
ubuntu1804-amd64-en-20211208
ubuntu-18.04-amd64
3 signatures
150 seconds
General
-
Target
skid.x86_64-20220820-1520
-
Size
72KB
-
MD5
7fa7e6efe6fb45748825bac13b2aebe2
-
SHA1
417aebce932a97f5e628143f205d926ec42134d2
-
SHA256
bfa8d23103e43211013f1edc0a027be27e6ff349139772ee7a1353987059245b
-
SHA512
ffe198b9cedb694b6f9be913186976701154e4dba1b9553a8ea519bd1a8bd2ff21be14ff83c13b8012cec09aa4ee85613218b824edce8779c503c9de619252a7
-
SSDEEP
1536:BtO0nLNoPLAJJjspJ/Mk4K8+90otBBKSyuDwQvgRB3IGMHge:+0LNsMjjsphi29nBBKIDwQOB3dige
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
Processes:
resource yara_rule sample family_mirai -
Mirai family
-
Mirai is a prevalent Linux malware infecting exposed network devices 1 IoCs
Detected Mirai Linux malware
Processes:
resource yara_rule sample elf_mirai_auto
Files
-
skid.x86_64-20220820-1520.elf linux x64