Behavioral task
behavioral1
Sample
Kobalt.x86
Resource
ubuntu1804-amd64-en-20211208
0 signatures
150 seconds
General
-
Target
Kobalt.x86
-
Size
28KB
-
MD5
d0ef0d5d3caffede25b63af0e888a0a8
-
SHA1
ffef8026ebf361b8867b8ef564420d16586e621e
-
SHA256
fffc496fb75d1a1d14a4a518c18feba4ad6e3f799318b1644063b8c09cf0bea4
-
SHA512
ba3be3113d54af9ff018e86fcc9dd230a1e6e0905f9a438b1248de7c8c2b7d0802ef0136ddf61869dc406e7398661d2350a4ecac78ae55573ebe30cf3ba0501f
-
SSDEEP
768:8lFafyxCphCYztN4O8sdiRxSkbzzO+NE:8lFafyxCphCYztPPdGxSkbnO+NE
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
resource yara_rule sample family_mirai -
Mirai family
-
Mirai is a prevalent Linux malware infecting exposed network devices 1 IoCs
Detected Mirai Linux malware
resource yara_rule sample elf_mirai_auto
Files
-
Kobalt.x86.elf linux x86