General

  • Target

    skid.x86-20220826-1703

  • Size

    61KB

  • MD5

    079d90cd5564dc3057f8811ecc17aede

  • SHA1

    b1c41472151bb16f5cf5866778e39adafb7c04f2

  • SHA256

    83406e829efc491880e142650a685b399c358f14eb000ffdfb131a094c44c36d

  • SHA512

    be50f307449b47399a32f7d94a9521e7b449833de871c12656bade1618ca03bef043853143b1a11035b427670030c0a0663d3a3886398a9a4fecb4e1b5a73d97

  • SSDEEP

    1536:9vsZO0qY5XXPg62t5OZBWTnbSQfYhwXzZKwPQNrW+:VsZORYRB2t5uBWbWQfYmzMKQA+

Score
10/10

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Mirai family
  • Mirai is a prevalent Linux malware infecting exposed network devices 1 IoCs

    Detected Mirai Linux malware

  • Mirai_x86corona family

Files

  • skid.x86-20220826-1703
    .elf linux x86