General

  • Target

    skid.x86-20220823-1147

  • Size

    54KB

  • MD5

    c5e00c4952c42df1ec6b2c1e77404e04

  • SHA1

    2c6b15819b17fac99de087692a82599011525d09

  • SHA256

    e95742913ccce0c4488a0d21355a82ce0cd5011f7e834ff390406c5c6fc5bd0d

  • SHA512

    a5b732d5223b5fd47c96e532edf91bb52ed684fa86b90cb2e1ba65ba6de551be6836ef7e4e536f8e1c2b2840d0d52241201c2ad53e9e9ae742b10a871438bc36

  • SSDEEP

    1536:IFcHnmvD926JB7XsRg38xIeiWG6gXADxrmO:UcHnmvs4B7Xv38KehXgwDwO

Score
10/10

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Mirai family
  • Mirai is a prevalent Linux malware infecting exposed network devices 1 IoCs

    Detected Mirai Linux malware

  • Mirai_x86corona family

Files

  • skid.x86-20220823-1147
    .elf linux x86