Behavioral task
behavioral1
Sample
skid.x86-20220826-1703
Resource
ubuntu1804-amd64-en-20211208
ubuntu-18.04-amd64
3 signatures
150 seconds
General
-
Target
skid.x86-20220826-1703
-
Size
61KB
-
MD5
079d90cd5564dc3057f8811ecc17aede
-
SHA1
b1c41472151bb16f5cf5866778e39adafb7c04f2
-
SHA256
83406e829efc491880e142650a685b399c358f14eb000ffdfb131a094c44c36d
-
SHA512
be50f307449b47399a32f7d94a9521e7b449833de871c12656bade1618ca03bef043853143b1a11035b427670030c0a0663d3a3886398a9a4fecb4e1b5a73d97
-
SSDEEP
1536:9vsZO0qY5XXPg62t5OZBWTnbSQfYhwXzZKwPQNrW+:VsZORYRB2t5uBWbWQfYmzMKQA+
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
resource yara_rule sample family_mirai -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Mirai family
-
Mirai is a prevalent Linux malware infecting exposed network devices 1 IoCs
Detected Mirai Linux malware
resource yara_rule sample elf_mirai_auto -
Mirai_x86corona family
Files
-
skid.x86-20220826-1703.elf linux x86