MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 02e0fe3a4509cd00d36b4ad1fbe6205bd33f3840ca496670546152c7eb5fcaa2. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: 02e0fe3a4509cd00d36b4ad1fbe6205bd33f3840ca496670546152c7eb5fcaa2
SHA3-384 hash: 7e0fada19e3fb4aa50bc34b4c64d0e70dc175221d85a3d527e2302dd3c60b19b0a0da7d423409981b42a017f1bb93314
SHA1 hash: c892cb9c750e176487d5da8fe553145971eb4304
MD5 hash: a1e755e2531ce2fbe3ac3631ef9acda1
humanhash: oregon-finch-alabama-london
File name:mpsl
Download: download sample
Signature Mirai
File size:109'248 bytes
First seen:2025-11-05 04:58:55 UTC
Last seen:Never
File type: elf
MIME type:application/x-executable
ssdeep 1536:lMUJ4is56ugRxUB9kP9REhg0KMFxu6/mxZe2dX1KT6OX19:lPugbrEhg094GSKmq
TLSH T1A6B3D606BF601EFBDC6FCC3709E91705258C651A22B96F3A7A34D92CB60B64F19D3864
TrID 50.1% (.) ELF Executable and Linkable format (Linux) (4022/12)
49.8% (.O) ELF Executable and Linkable format (generic) (4000/1)
Magika elf
Reporter abuse_ch
Tags:elf mirai upx-dec


Avatar
abuse_ch
UPX decompressed file, sourced from SHA256 56e9531906023a89d7a9f5387071b14c474065f7250ccc612dffa5f37c64eb3c
File size (compressed) :43'824 bytes
File size (de-compressed) :109'248 bytes
Format:linux/mipsel
Packed file: 56e9531906023a89d7a9f5387071b14c474065f7250ccc612dffa5f37c64eb3c

Intelligence


File Origin
# of uploads :
1
# of downloads :
81
Origin country :
NL NL
Vendor Threat Intelligence
Result
Verdict:
Clean
Maliciousness:

Behaviour
Connection attempt
Verdict:
Malicious
File Type:
elf.32.le
First seen:
2025-11-05T03:13:00Z UTC
Last seen:
2025-11-05T06:08:00Z UTC
Hits:
~10
Status:
terminated
Behavior Graph:
%3 guuid=8742f65a-1800-0000-181c-9ab9c4060000 pid=1732 /usr/bin/sudo guuid=827b335e-1800-0000-181c-9ab9cd060000 pid=1741 /tmp/sample.bin guuid=8742f65a-1800-0000-181c-9ab9c4060000 pid=1732->guuid=827b335e-1800-0000-181c-9ab9cd060000 pid=1741 execve guuid=dd33d15f-1800-0000-181c-9ab9d4060000 pid=1748 /usr/bin/dash guuid=827b335e-1800-0000-181c-9ab9cd060000 pid=1741->guuid=dd33d15f-1800-0000-181c-9ab9d4060000 pid=1748 clone
Result
Threat name:
Detection:
malicious
Classification:
troj
Score:
64 / 100
Signature
Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Yara detected Mirai
Behaviour
Behavior Graph:
Threat name:
Linux.Exploit.Mirai
Status:
Malicious
First seen:
2025-11-05 05:05:59 UTC
File Type:
ELF32 Little (Exe)
AV detection:
15 of 24 (62.50%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:mirai defense_evasion
Behaviour
Modifies Watchdog functionality
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

elf 02e0fe3a4509cd00d36b4ad1fbe6205bd33f3840ca496670546152c7eb5fcaa2

(this sample)

  
Delivery method
Distributed via web download

Comments