General

  • Target

    skid.x86-20220815-1256

  • Size

    57KB

  • MD5

    50ea43103c2f9791d05c0a9c75b235a9

  • SHA1

    e5dac3fe73a1fcaaf1d36a81ce7368192d77136f

  • SHA256

    4281cc9ffaf7a3329efcf62ad231e4b96374406e44ece5dde09873984a0cc647

  • SHA512

    481861c9d7af10060511d260c69f7656d2f8a515d4378223caff57c09bb7d3dab627fb22ffe2d1d97d47d08080bb67d79bbffc800513b25e0a43403b28d63eaa

  • SSDEEP

    1536:BF14yTUx6Ahc+IOROP9PqEqRaSblcMUiBVFrVsBwbZnm:B/4yTUxdzIOgP9/qRt5cMlrH2wbZnm

Score
10/10

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Mirai family
  • Mirai is a prevalent Linux malware infecting exposed network devices 1 IoCs

    Detected Mirai Linux malware

  • Mirai_x86corona family

Files

  • skid.x86-20220815-1256
    .elf linux x86