General

  • Target

    skid.x86

  • Size

    53KB

  • MD5

    357ae09836eec7a0d0992be3ab1368d7

  • SHA1

    e43d4ff7bc11e6180c0fa2b1a73670e403238c78

  • SHA256

    af14fcbcf9c5f8f68c25ee485a35ebd87f720009f080377cb4323324a728b83f

  • SHA512

    9db6ad90ee3de194a4e3feab4db22f921ed88b07741204211efba5f47354dfe70412927496a7923a4514eb85d61f1d4f9ce0597c742156bdcce740ba76d05f7a

  • SSDEEP

    1536:KkjzqAl9JnIZvmJ3D2pQxAxIR/4TTrRBwbZnG:KkjzqQT8mBD2CxwmATLwbZnG

Score
10/10

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Mirai family
  • Mirai is a prevalent Linux malware infecting exposed network devices 1 IoCs

    Detected Mirai Linux malware

  • Mirai_x86corona family

Files

  • skid.x86
    .elf linux x86