Behavioral task
behavioral1
Sample
skidv2.x86.elf
Resource
ubuntu1804-amd64-en-20211208
ubuntu-18.04-amd64
1 signatures
150 seconds
General
-
Target
skidv2.x86.elf
-
Size
61KB
-
MD5
b76135f3e2ebe5217ba69ad111877a10
-
SHA1
98768bd773290740e549a0919bbd1bea5ac3f0b5
-
SHA256
caa9ff12a745379795f5291338cff1957ba217ea35e2796789f28fe8ab469810
-
SHA512
e448eecbb913c35accf206bc2b85b3f719e7c80fd1e1418c89d0ab69440999773c57df139a8979b6bda2d93d461ff1c9505be04afba0ad1d6041454a37a03b68
-
SSDEEP
1536:ujolDRip7t1L0u4o6Kt6POwLbOkGA4DI87DkKbwhNxrT7+:YolDRipbwsRcOwmk3qPDNYNZ7
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
resource yara_rule sample family_mirai -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Mirai family
-
Mirai is a prevalent Linux malware infecting exposed network devices 1 IoCs
Detected Mirai Linux malware
resource yara_rule sample elf_mirai_auto -
Mirai_x86corona family
Files
-
skidv2.x86.elf.elf linux x86