MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 03cb84a8e867d15dd503835eefb2f493ea289c3f59d75e5caeec49a2d66d28a5. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 10


Intelligence 10 IOCs YARA 1 File information Comments

SHA256 hash: 03cb84a8e867d15dd503835eefb2f493ea289c3f59d75e5caeec49a2d66d28a5
SHA3-384 hash: a9d6e2ac8c0a12e607d2dbd4a52f9ce5c7203b1b191d8fb2130d023aba8871dc371af2e814321b105cdc602bc5a894a0
SHA1 hash: 2390285e471d1e9bda939cf4ad6e55659d3b6c40
MD5 hash: 69d99c9f1a52f4c0e33ff0a1efa85749
humanhash: uniform-delaware-victor-november
File name:ppc
Download: download sample
Signature Mirai
File size:64'144 bytes
First seen:2025-07-25 04:51:16 UTC
Last seen:Never
File type: elf
MIME type:application/x-executable
ssdeep 768:hhBWa39OkCFARpP4kRVda67xXBvTVREioB0956sVajNOr8bAIBnzNSF4/tf0b7aG:Ma3QkCeLo6hBXoBm5VQkQAIpJ/lU7aG
TLSH T116533902731C0943D1A35AB0293F27E093EFED9021F4B688791F9B5A9275E3A1586FCD
Magika elf
Reporter abuse_ch
Tags:elf mirai

Intelligence


File Origin
# of uploads :
1
# of downloads :
51
Origin country :
DE DE
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Opens a port
Sends data to a server
Creating a file
Receives data from a server
Connection attempt
DNS request
Kills processes
Mounts file systems
Runs as daemon
Kills critical processes
Substitutes an application name
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
mirai
Status:
terminated
Behavior Graph:
%3 guuid=f05873dc-1700-0000-fe98-4a8c5b0b0000 pid=2907 /usr/bin/sudo guuid=84e72ae0-1700-0000-fe98-4a8c5d0b0000 pid=2909 /tmp/sample.bin guuid=f05873dc-1700-0000-fe98-4a8c5b0b0000 pid=2907->guuid=84e72ae0-1700-0000-fe98-4a8c5d0b0000 pid=2909 execve
Result
Threat name:
Detection:
malicious
Classification:
spre.troj
Score:
76 / 100
Signature
Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Reads system files that contain records of logged in users
Sample reads /proc/mounts (often used for finding a writable filesystem)
Sample tries to kill multiple processes (SIGKILL)
Yara detected Mirai
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1743858 Sample: ppc.elf Startdate: 25/07/2025 Architecture: LINUX Score: 76 90 Antivirus / Scanner detection for submitted sample 2->90 92 Multi AV Scanner detection for submitted file 2->92 94 Yara detected Mirai 2->94 10 systemd gdm3 2->10         started        12 ppc.elf 2->12         started        14 systemd gpu-manager 2->14         started        16 22 other processes 2->16 process3 file4 20 gdm3 gdm-session-worker 10->20         started        34 3 other processes 10->34 22 ppc.elf 12->22         started        24 gpu-manager sh 14->24         started        26 gpu-manager sh 14->26         started        28 gpu-manager sh 14->28         started        36 5 other processes 14->36 84 /var/log/wtmp, data 16->84 dropped 86 Sample reads /proc/mounts (often used for finding a writable filesystem) 16->86 88 Reads system files that contain records of logged in users 16->88 30 accounts-daemon language-validate 16->30         started        32 generate-config pkill 16->32         started        signatures5 process6 process7 38 gdm-session-worker gdm-wayland-session 20->38         started        40 ppc.elf 22->40         started        42 ppc.elf 22->42         started        52 3 other processes 22->52 44 sh grep 24->44         started        46 sh grep 26->46         started        48 sh grep 28->48         started        50 language-validate language-options 30->50         started        54 5 other processes 36->54 process8 56 gdm-wayland-session dbus-run-session 38->56         started        58 gdm-wayland-session dbus-daemon 38->58         started        61 ppc.elf 40->61         started        63 ppc.elf 42->63         started        65 language-options sh 50->65         started        67 ppc.elf 52->67         started        69 ppc.elf 52->69         started        71 ppc.elf 52->71         started        signatures9 73 dbus-run-session dbus-daemon 56->73         started        98 Sample reads /proc/mounts (often used for finding a writable filesystem) 58->98 76 dbus-daemon 58->76         started        100 Sample tries to kill multiple processes (SIGKILL) 61->100 78 sh locale 65->78         started        80 sh grep 65->80         started        process10 signatures11 96 Sample reads /proc/mounts (often used for finding a writable filesystem) 73->96 82 dbus-daemon false 76->82         started        process12
Verdict:
Malicious
Threat:
HEUR:Backdoor.Linux.Mirai
Threat name:
Linux.Worm.Mirai
Status:
Malicious
First seen:
2025-07-25 04:51:25 UTC
File Type:
ELF32 Big (Exe)
AV detection:
18 of 34 (52.94%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:mirai linux
Verdict:
Malicious
Tags:
Unix.Dropper.Mirai-7135957-0
YARA:
n/a
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:unixredflags3
Author:Tim Brown @timb_machine
Description:Hunts for UNIX red flags

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

elf 03cb84a8e867d15dd503835eefb2f493ea289c3f59d75e5caeec49a2d66d28a5

(this sample)

  
Delivery method
Distributed via web download

Comments