MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 01729ee5271048948f751768b872e00f63c30486321c24fc252a8895029ea594. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 8


Intelligence 8 IOCs YARA 10 File information Comments

SHA256 hash: 01729ee5271048948f751768b872e00f63c30486321c24fc252a8895029ea594
SHA3-384 hash: f1eab04a27f37814321ea3e02bc24edca404624d3eb42c0df5082d163dbd4feb83a666991a9811c618bb3d64abdfbf1b
SHA1 hash: dd9d41d91a7d2fae196f0683084225ff17455317
MD5 hash: 7afe8190dafdf94adea21bfbdd214048
humanhash: twenty-nuts-steak-salami
File name:mirai.x86
Download: download sample
Signature Mirai
File size:125'384 bytes
First seen:2025-12-28 07:46:09 UTC
Last seen:Never
File type: elf
MIME type:application/x-executable
ssdeep 3072:cq1aLtYCX1jMmlUXjHJ58H+ZfFbjiuwIYDXEUvh4pV9gpKeyYf3:B1amCFwmGjHwkIIlU6xgryYf3
TLSH T11EC36BC1EA43D5F2F85211B5103BA7728B73D0362529EA56D3A92D36EC12F60C61B3AD
telfhash t1665127fdb6ba0ce9a7909802d24d57617d4ebbbb247036b705f35870327aa4141bbc39
TrID 50.1% (.) ELF Executable and Linkable format (Linux) (4022/12)
49.8% (.O) ELF Executable and Linkable format (generic) (4000/1)
Magika elf
Reporter abuse_ch
Tags:elf mirai

Intelligence


File Origin
# of uploads :
1
# of downloads :
38
Origin country :
DE DE
Vendor Threat Intelligence
No detections
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
gafgyt masquerade mirai
Result
Gathering data
Status:
terminated
Behavior Graph:
%3 guuid=d254bd52-1800-0000-41d9-e55fa00b0000 pid=2976 /usr/bin/sudo guuid=32a46d54-1800-0000-41d9-e55fa50b0000 pid=2981 /tmp/sample.bin net guuid=d254bd52-1800-0000-41d9-e55fa00b0000 pid=2976->guuid=32a46d54-1800-0000-41d9-e55fa50b0000 pid=2981 execve 8b0a01dc-0728-52c1-8024-c4ba7801b8d6 8.8.8.8:53 guuid=32a46d54-1800-0000-41d9-e55fa50b0000 pid=2981->8b0a01dc-0728-52c1-8024-c4ba7801b8d6 con guuid=46c9a354-1800-0000-41d9-e55fa60b0000 pid=2982 /tmp/sample.bin guuid=32a46d54-1800-0000-41d9-e55fa50b0000 pid=2981->guuid=46c9a354-1800-0000-41d9-e55fa60b0000 pid=2982 clone guuid=d12cb454-1800-0000-41d9-e55fa80b0000 pid=2984 /tmp/sample.bin delete-file write-config write-file zombie guuid=46c9a354-1800-0000-41d9-e55fa60b0000 pid=2982->guuid=d12cb454-1800-0000-41d9-e55fa80b0000 pid=2984 clone guuid=1aa0205a-1800-0000-41d9-e55fac0b0000 pid=2988 /usr/bin/dash guuid=d12cb454-1800-0000-41d9-e55fa80b0000 pid=2984->guuid=1aa0205a-1800-0000-41d9-e55fac0b0000 pid=2988 execve guuid=6d45a48f-1800-0000-41d9-e55f320c0000 pid=3122 /usr/bin/dash guuid=d12cb454-1800-0000-41d9-e55fa80b0000 pid=2984->guuid=6d45a48f-1800-0000-41d9-e55f320c0000 pid=3122 execve guuid=71cb81b7-1800-0000-41d9-e55fa10c0000 pid=3233 /usr/bin/dash guuid=d12cb454-1800-0000-41d9-e55fa80b0000 pid=2984->guuid=71cb81b7-1800-0000-41d9-e55fa10c0000 pid=3233 execve guuid=e88a51c0-1800-0000-41d9-e55fb60c0000 pid=3254 /tmp/sample.bin net send-data guuid=d12cb454-1800-0000-41d9-e55fa80b0000 pid=2984->guuid=e88a51c0-1800-0000-41d9-e55fb60c0000 pid=3254 clone guuid=a3c1755a-1800-0000-41d9-e55fad0b0000 pid=2989 /usr/bin/systemctl guuid=1aa0205a-1800-0000-41d9-e55fac0b0000 pid=2988->guuid=a3c1755a-1800-0000-41d9-e55fad0b0000 pid=2989 execve guuid=bb8ccd8f-1800-0000-41d9-e55f330c0000 pid=3123 /usr/bin/systemctl guuid=6d45a48f-1800-0000-41d9-e55f320c0000 pid=3122->guuid=bb8ccd8f-1800-0000-41d9-e55f330c0000 pid=3123 execve guuid=6699aeb7-1800-0000-41d9-e55fa20c0000 pid=3234 /usr/bin/systemctl guuid=71cb81b7-1800-0000-41d9-e55fa10c0000 pid=3233->guuid=6699aeb7-1800-0000-41d9-e55fa20c0000 pid=3234 execve guuid=2fdaba13-0000-0000-41d9-e55f01000000 pid=1 /usr/lib/systemd/systemd guuid=deba34b9-1800-0000-41d9-e55fa70c0000 pid=3239 /usr/bin/.sh net guuid=2fdaba13-0000-0000-41d9-e55f01000000 pid=1->guuid=deba34b9-1800-0000-41d9-e55fa70c0000 pid=3239 execve guuid=deba34b9-1800-0000-41d9-e55fa70c0000 pid=3239->8b0a01dc-0728-52c1-8024-c4ba7801b8d6 con guuid=2cfac3bb-1800-0000-41d9-e55fac0c0000 pid=3244 /usr/bin/.sh guuid=deba34b9-1800-0000-41d9-e55fa70c0000 pid=3239->guuid=2cfac3bb-1800-0000-41d9-e55fac0c0000 pid=3244 clone guuid=af7bd0bb-1800-0000-41d9-e55fad0c0000 pid=3245 /usr/bin/.sh delete-file write-config zombie guuid=2cfac3bb-1800-0000-41d9-e55fac0c0000 pid=3244->guuid=af7bd0bb-1800-0000-41d9-e55fad0c0000 pid=3245 clone guuid=efbd26c0-1800-0000-41d9-e55fb50c0000 pid=3253 /usr/bin/dash guuid=af7bd0bb-1800-0000-41d9-e55fad0c0000 pid=3245->guuid=efbd26c0-1800-0000-41d9-e55fb50c0000 pid=3253 execve guuid=80c9d6c0-1800-0000-41d9-e55fbb0c0000 pid=3259 /usr/bin/dash guuid=af7bd0bb-1800-0000-41d9-e55fad0c0000 pid=3245->guuid=80c9d6c0-1800-0000-41d9-e55fbb0c0000 pid=3259 execve guuid=1bb3abfe-1800-0000-41d9-e55f0d0d0000 pid=3341 /usr/bin/dash guuid=af7bd0bb-1800-0000-41d9-e55fad0c0000 pid=3245->guuid=1bb3abfe-1800-0000-41d9-e55f0d0d0000 pid=3341 execve guuid=057d502e-1900-0000-41d9-e55f980d0000 pid=3480 /usr/bin/dash guuid=af7bd0bb-1800-0000-41d9-e55fad0c0000 pid=3245->guuid=057d502e-1900-0000-41d9-e55f980d0000 pid=3480 execve guuid=ba94f531-1900-0000-41d9-e55fa40d0000 pid=3492 /usr/bin/.sh net send-data guuid=af7bd0bb-1800-0000-41d9-e55fad0c0000 pid=3245->guuid=ba94f531-1900-0000-41d9-e55fa40d0000 pid=3492 clone guuid=f45f7fc0-1800-0000-41d9-e55fb90c0000 pid=3257 /usr/bin/cp guuid=efbd26c0-1800-0000-41d9-e55fb50c0000 pid=3253->guuid=f45f7fc0-1800-0000-41d9-e55fb90c0000 pid=3257 execve guuid=e88a51c0-1800-0000-41d9-e55fb60c0000 pid=3254->8b0a01dc-0728-52c1-8024-c4ba7801b8d6 con c70544fc-d01a-5ba5-9c82-b6dcd8b2f0fa 86.54.42.154:443 guuid=e88a51c0-1800-0000-41d9-e55fb60c0000 pid=3254->c70544fc-d01a-5ba5-9c82-b6dcd8b2f0fa send: 38B guuid=ae0b64c0-1800-0000-41d9-e55fb80c0000 pid=3256 /tmp/sample.bin guuid=e88a51c0-1800-0000-41d9-e55fb60c0000 pid=3254->guuid=ae0b64c0-1800-0000-41d9-e55fb80c0000 pid=3256 clone guuid=f3c700c1-1800-0000-41d9-e55fbd0c0000 pid=3261 /usr/bin/systemctl guuid=80c9d6c0-1800-0000-41d9-e55fbb0c0000 pid=3259->guuid=f3c700c1-1800-0000-41d9-e55fbd0c0000 pid=3261 execve guuid=afa7d3fe-1800-0000-41d9-e55f0e0d0000 pid=3342 /usr/bin/systemctl guuid=1bb3abfe-1800-0000-41d9-e55f0d0d0000 pid=3341->guuid=afa7d3fe-1800-0000-41d9-e55f0e0d0000 pid=3342 execve guuid=fb7e962e-1900-0000-41d9-e55f9a0d0000 pid=3482 /usr/bin/systemctl guuid=057d502e-1900-0000-41d9-e55f980d0000 pid=3480->guuid=fb7e962e-1900-0000-41d9-e55f9a0d0000 pid=3482 execve guuid=ba94f531-1900-0000-41d9-e55fa40d0000 pid=3492->8b0a01dc-0728-52c1-8024-c4ba7801b8d6 con guuid=ba94f531-1900-0000-41d9-e55fa40d0000 pid=3492->c70544fc-d01a-5ba5-9c82-b6dcd8b2f0fa send: 931B 57d16544-f04f-5b5b-9557-de493f14ae55 0.0.0.0:48102 guuid=ba94f531-1900-0000-41d9-e55fa40d0000 pid=3492->57d16544-f04f-5b5b-9557-de493f14ae55 con guuid=c4728d5f-1a00-0000-41d9-e55f86110000 pid=4486 /usr/bin/.sh net send-data guuid=ba94f531-1900-0000-41d9-e55fa40d0000 pid=3492->guuid=c4728d5f-1a00-0000-41d9-e55f86110000 pid=4486 clone guuid=c4728d5f-1a00-0000-41d9-e55f86110000 pid=4486->8b0a01dc-0728-52c1-8024-c4ba7801b8d6 con guuid=c4728d5f-1a00-0000-41d9-e55f86110000 pid=4486->c70544fc-d01a-5ba5-9c82-b6dcd8b2f0fa send: 817B
Result
Threat name:
Detection:
malicious
Classification:
troj.evad
Score:
92 / 100
Signature
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Drops files in suspicious directories
Drops invisible ELF files
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Sample deletes itself
Yara detected Mirai
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1840719 Sample: mirai.x86.elf Startdate: 28/12/2025 Architecture: LINUX Score: 92 70 86.54.42.154, 443, 53196, 53198 KCOM-SPNService-ProviderNetworkex-MistralGB United Kingdom 2->70 72 Malicious sample detected (through community Yara rule) 2->72 74 Antivirus detection for dropped file 2->74 76 Antivirus / Scanner detection for submitted sample 2->76 78 2 other signatures 2->78 10 mirai.x86.elf 2->10         started        12 systemd .sh 2->12         started        14 systemd .sh 2->14         started        16 6 other processes 2->16 signatures3 process4 process5 18 mirai.x86.elf 10->18         started        20 .sh 12->20         started        22 .sh 14->22         started        process6 24 mirai.x86.elf 18->24         started        28 .sh 20->28         started        30 .sh 22->30         started        file7 68 /usr/bin/.sh, ELF 24->68 dropped 80 Drops invisible ELF files 24->80 82 Drops files in suspicious directories 24->82 84 Sample deletes itself 24->84 32 mirai.x86.elf sh 24->32         started        34 mirai.x86.elf sh 24->34         started        36 mirai.x86.elf sh 24->36         started        38 mirai.x86.elf 24->38         started        40 .sh sh 28->40         started        42 .sh sh 28->42         started        44 .sh sh 28->44         started        46 .sh sh 28->46         started        48 4 other processes 30->48 signatures8 process9 process10 50 sh systemctl 32->50         started        52 sh systemctl 34->52         started        54 sh systemctl 36->54         started        56 mirai.x86.elf 38->56         started        58 sh cp 40->58         started        60 sh systemctl 42->60         started        62 sh systemctl 44->62         started        64 sh systemctl 46->64         started        66 4 other processes 48->66
Threat name:
Linux.Backdoor.Mirai
Status:
Malicious
First seen:
2025-12-28 07:46:18 UTC
File Type:
ELF32 Little (Exe)
AV detection:
13 of 36 (36.11%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
discovery linux persistence privilege_escalation
Behaviour
Reads runtime system information
Changes its process name
Reads system network configuration
Enumerates active TCP sockets
Enumerates running processes
Modifies systemd
Write file to user bin folder
Deletes itself
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:ach_202503_elf_Mirai
Author:abuse.ch
Description:Detects Mirai 'TSource' ELF files
Rule name:ELF_IoT_Persistence_Hunt
Author:4r4
Description:Hunts for ELF files with persistence and download capabilities
Rule name:ELF_Toriilike_persist
Author:4r4
Description:Detects Torii IoT Botnet (stealthier Mirai alternative)
Reference:Identified via researched data
Rule name:linux_generic_ipv6_catcher
Author:@_lubiedo
Description:ELF samples using IPv6 addresses
Rule name:Linux_Mirai_Generic
Author:albertzsigovits
Description:Generic Approach to Mirai/Gafgyt samples
Rule name:Linux_Trojan_Gafgyt_5bf62ce4
Author:Elastic Security
Rule name:Linux_Trojan_Mirai_389ee3e9
Author:Elastic Security
Rule name:Linux_Trojan_Mirai_5f7b67b8
Author:Elastic Security
Rule name:Linux_Trojan_Mirai_cc93863b
Author:Elastic Security
Rule name:unixredflags3
Author:Tim Brown @timb_machine
Description:Hunts for UNIX red flags

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

elf 01729ee5271048948f751768b872e00f63c30486321c24fc252a8895029ea594

(this sample)

  
Delivery method
Distributed via web download

Comments