MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 057ac3a7ee90a5453770791705cb5f9c509eb42082f3dc8d802aaf4e7b6de906. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 9


Intelligence 9 IOCs YARA File information Comments

SHA256 hash: 057ac3a7ee90a5453770791705cb5f9c509eb42082f3dc8d802aaf4e7b6de906
SHA3-384 hash: ba24170e781669557ad05c2d9cccb952616bcf88e995231555f658b3e442ef35705e35c2642d5b6841438409e88d0b84
SHA1 hash: 3959bf736141ff38b5dc6fcbd128af6ca5700f93
MD5 hash: 990db44e59cb551c8db0636902d7194e
humanhash: maryland-ceiling-lion-potato
File name:dlr.x86
Download: download sample
Signature Mirai
File size:1'444 bytes
First seen:2025-12-06 07:28:45 UTC
Last seen:2025-12-06 22:47:54 UTC
File type: elf
MIME type:application/x-executable
ssdeep 24:FlJqmTk0ee7FAzhlKZFViZOC8VidFGZ8/Y/C/+1uNlzxSkySuluoFRVa2fNPr:fJKG+LcFVkOC8oFPY/k+1AzxSZSu0gRp
TLSH T1133110576186F8B3E222007759956F1B6B748CE26072FF0ACF506C11FC395C0D132364
telfhash t15ab092d20f03543c30e2710442a3020078e80de71350c8c170b0b00137c37494153200
TrID 50.1% (.) ELF Executable and Linkable format (Linux) (4022/12)
49.8% (.O) ELF Executable and Linkable format (generic) (4000/1)
Magika elf
Reporter abuse_ch
Tags:elf mirai

Intelligence


File Origin
# of uploads :
4
# of downloads :
37
Origin country :
DE DE
Vendor Threat Intelligence
No detections
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
masquerade mirai
Verdict:
Malicious
File Type:
elf.32.le
First seen:
2025-12-06T06:30:00Z UTC
Last seen:
2025-12-07T01:41:00Z UTC
Hits:
~10
Result
Threat name:
n/a
Detection:
malicious
Classification:
n/a
Score:
56 / 100
Signature
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1827858 Sample: dlr.x86.elf Startdate: 06/12/2025 Architecture: LINUX Score: 56 29 169.254.169.254, 80 USDOSUS Reserved 2->29 31 45.8.93.146, 2113, 48404 TING-WIRELESSUS Germany 2->31 33 2 other IPs or domains 2->33 35 Malicious sample detected (through community Yara rule) 2->35 37 Multi AV Scanner detection for submitted file 2->37 8 dlr.x86.elf Hari 2->8         started        11 python3.8 dpkg 2->11         started        signatures3 process4 file5 27 /tmp/Hari, ELF 8->27 dropped 13 Hari 8->13         started        15 Hari 8->15         started        17 Hari 8->17         started        process6 process7 19 Hari iptables 13->19         started        21 Hari iptables 13->21         started        23 Hari iptables 13->23         started        25 30 other processes 13->25
Threat name:
Linux.Worm.Mirai
Status:
Malicious
First seen:
2025-12-06 07:16:06 UTC
File Type:
ELF32 Little (Exe)
AV detection:
18 of 37 (48.65%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
linux
Behaviour
Writes file to tmp directory
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

elf 057ac3a7ee90a5453770791705cb5f9c509eb42082f3dc8d802aaf4e7b6de906

(this sample)

  
Delivery method
Distributed via web download

Comments