MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 0699da5b5039904173deb6327c38291b0ce9f56cb0db9bb30ce8815304c8b241. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 8


Intelligence 8 IOCs YARA File information Comments

SHA256 hash: 0699da5b5039904173deb6327c38291b0ce9f56cb0db9bb30ce8815304c8b241
SHA3-384 hash: 93b6d49e7294233d8f5f9513497e1c0fa25f900cbde4c97e8437f3c3aa45ece5597530d83228d97a125c7c9f8c4b7cd3
SHA1 hash: d46f51d292b84273c9edbdf1399069f7798d7a22
MD5 hash: d6a05da36a2c8fc1d1a7fb9a0166f1f6
humanhash: oranges-hotel-enemy-arkansas
File name:lol.armv5l
Download: download sample
Signature Mirai
File size:107'272 bytes
First seen:2025-04-17 10:00:02 UTC
Last seen:2025-04-17 11:18:56 UTC
File type: elf
MIME type:application/x-executable
ssdeep 1536:K/nOXtSG38AMzAzvldwrPvGIBp+0nsq+coA5zp5JXrDrnClVjJgOMj/E7kFAOhEE:Lt0AMzAErPvGIBp9nsqUOp5xKJgLzTR
TLSH T146A31B8DE861AB26C1E965BEFE6D05CD330217BCD2EA31158D065F21678E84D0E3EBC5
Magika elf
Reporter abuse_ch
Tags:elf mirai

Intelligence


File Origin
# of uploads :
2
# of downloads :
69
Origin country :
DE DE
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Connection attempt
DNS request
Sends data to a server
Opens a port
Creating a file
Receives data from a server
Substitutes an application name
Verdict:
Malicious
Uses P2P?:
false
Uses anti-vm?:
false
Architecture:
arm
Packer:
not packed
Botnet:
unknown
Number of open files:
1
Number of processes launched:
1
Processes remaning?
true
Remote TCP ports scanned:
not identified
Behaviour
Process Renaming
Botnet C2s
TCP botnet C2(s):
not identified
UDP botnet C2(s):
type: 74.125.250.129:19302
Result
Threat name:
n/a
Detection:
malicious
Classification:
troj.evad
Score:
56 / 100
Signature
Performs DNS TXT record lookups
Suricata IDS alerts for network traffic
Uses STUN server to do NAT traversial
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1667365 Sample: lol.armv5l.elf Startdate: 17/04/2025 Architecture: LINUX Score: 56 17 6mv1eyr328y6due83u3js6whtzuxfyhw.su 2->17 19 stun.l.google.com 2->19 21 2 other IPs or domains 2->21 23 Suricata IDS alerts for network traffic 2->23 7 dash rm lol.armv5l.elf 2->7         started        9 dash rm 2->9         started        11 dash cut 2->11         started        13 7 other processes 2->13 signatures3 25 Performs DNS TXT record lookups 17->25 27 Uses STUN server to do NAT traversial 19->27 process4 process5 15 lol.armv5l.elf 7->15         started       
Threat name:
Linux.Worm.Mirai
Status:
Malicious
First seen:
2025-04-17 10:00:57 UTC
File Type:
ELF32 Little (Exe)
AV detection:
10 of 24 (41.67%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
n/a
Behaviour
Changes its process name
Renames itself
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

elf 0699da5b5039904173deb6327c38291b0ce9f56cb0db9bb30ce8815304c8b241

(this sample)

Comments