MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 06c29d034f81cb47812d0777a90a679538b9418516125a1f0ae107e3d413e03c. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 6


Intelligence 6 IOCs YARA 4 File information Comments

SHA256 hash: 06c29d034f81cb47812d0777a90a679538b9418516125a1f0ae107e3d413e03c
SHA3-384 hash: 0a92da08f06b38eda3a2b489fd38e3a09894c07a1aa689615dbea1c4fc19cfdc4c3d5b59cb0a03bf24b8fa45aa538938
SHA1 hash: 599a074fb1d940e54680514a9aaf8193e60ab16e
MD5 hash: 6cc099339b1661b12687c4c1eba223e1
humanhash: blue-mississippi-alpha-berlin
File name:arm
Download: download sample
Signature Mirai
File size:91'832 bytes
First seen:2025-12-03 05:23:10 UTC
Last seen:Never
File type: elf
MIME type:application/x-sharedlib
ssdeep 1536:bKg390A9biXsW0qhfQds3r3gG47zSVH5fold+UteuEgOm2v71G5wCyf:bKg3RbiXsoQs3r3gpzC5folPJEgY7Q5u
TLSH T1159301967DCD5094E5E9A33328CFC2B91E369D4D91B7B01EDEC6078425EA0AD239CF12
Magika elf
Reporter abuse_ch
Tags:elf UPX
File size (compressed) :91'832 bytes
File size (de-compressed) :209'764 bytes
Format:linux/arm
Unpacked file: ae8c547ece5a434f8b852aed2d926baf9d3a3ef1e729757e82e63408d96f2cba

Intelligence


File Origin
# of uploads :
1
# of downloads :
18
Origin country :
DE DE
Vendor Threat Intelligence
Details
No details
Verdict:
Unknown
Threat level:
  2.5/10
Confidence:
100%
Tags:
packed upx
Result
Gathering data
Result
Threat name:
n/a
Detection:
suspicious
Classification:
evad
Score:
22 / 100
Signature
Sample is packed with UPX
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1825074 Sample: arm.elf Startdate: 03/12/2025 Architecture: LINUX Score: 22 14 169.254.169.254, 80 USDOSUS Reserved 2->14 16 91.92.243.93, 443, 52258, 52260 THEZONEBG Bulgaria 2->16 18 4 other IPs or domains 2->18 20 Sample is packed with UPX 2->20 6 dash rm 2->6         started        8 dash rm 2->8         started        10 python3.8 dpkg 2->10         started        12 arm.elf 2->12         started        signatures3 process4
Gathering data
Result
Malware family:
n/a
Score:
  5/10
Tags:
discovery upx
Behaviour
Reads runtime system information
Changes its process name
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:elf_arm_mips_ko_so
Rule name:SUSP_ELF_LNX_UPX_Compressed_File
Author:Florian Roth (Nextron Systems)
Description:Detects a suspicious ELF binary with UPX compression
Reference:Internal Research
Rule name:unixredflags3
Author:Tim Brown @timb_machine
Description:Hunts for UNIX red flags
Rule name:upx_packed_elf_v1
Author:RandomMalware

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

elf 06c29d034f81cb47812d0777a90a679538b9418516125a1f0ae107e3d413e03c

(this sample)

  
Delivery method
Distributed via web download

Comments