MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 083c9ebe27e1175659961a804f3e4d540e3d5eaebf733425bca65d5384f1c95c. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 9


Intelligence 9 IOCs YARA File information Comments

SHA256 hash: 083c9ebe27e1175659961a804f3e4d540e3d5eaebf733425bca65d5384f1c95c
SHA3-384 hash: 5c4ab93e4aee8b2b6f5bd58e66b55be2c34fa6628dee3dbbd6f4ea79b14cf4e77a3282cb6543e569503c7b281bea14df
SHA1 hash: 269086cd8a7fd5278308d68adab941fa91319dac
MD5 hash: c3a0ae9af1a3e6e13f9edbadfd926c25
humanhash: moon-eleven-california-white
File name:Owari.m68k
Download: download sample
Signature Mirai
File size:52'360 bytes
First seen:2026-02-07 14:28:10 UTC
Last seen:Never
File type: elf
MIME type:application/x-executable
ssdeep 768:p8eTIuI9Me1KyWFr/Qhyuw3gFHnuGU7wWWJUH8w9KqQeO8tTW:eeId9MUKBEoAFnuGUwfUH8wkqQV8RW
TLSH T1FF3309DAB402AD7CF98EEABE80670E09B230331451531727676BFDD37D32154E952E86
Magika elf
Reporter abuse_ch
Tags:elf mirai

Intelligence


File Origin
# of uploads :
1
# of downloads :
38
Origin country :
DE DE
Vendor Threat Intelligence
Malware configuration found for:
Mirai
Details
Mirai
an XOR decryption key and at least a c2 socket address
Verdict:
Unknown
Threat level:
  0/10
Confidence:
100%
Tags:
masquerade
Result
Gathering data
Result
Threat name:
n/a
Detection:
malicious
Classification:
n/a
Score:
56 / 100
Signature
Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1865264 Sample: Owari.m68k.elf Startdate: 07/02/2026 Architecture: LINUX Score: 56 44 219.91.212.166, 23 YOU-INDIA-APYOUBroadbandCableIndiaLtdIN India 2->44 46 206.207.208.132 WN-AZ-ASUS United States 2->46 48 99 other IPs or domains 2->48 50 Antivirus / Scanner detection for submitted sample 2->50 52 Multi AV Scanner detection for submitted file 2->52 10 Owari.m68k.elf 2->10         started        12 python3.8 dpkg 2->12         started        signatures3 process4 process5 14 Owari.m68k.elf 10->14         started        16 Owari.m68k.elf 10->16         started        18 Owari.m68k.elf 10->18         started        process6 20 Owari.m68k.elf 14->20         started        22 Owari.m68k.elf 14->22         started        24 Owari.m68k.elf 16->24         started        26 Owari.m68k.elf 16->26         started        28 Owari.m68k.elf 16->28         started        process7 30 Owari.m68k.elf 20->30         started        32 Owari.m68k.elf 20->32         started        34 Owari.m68k.elf 20->34         started        36 Owari.m68k.elf 24->36         started        38 Owari.m68k.elf 24->38         started        process8 40 Owari.m68k.elf 30->40         started        42 Owari.m68k.elf 30->42         started       
Threat name:
Linux.Worm.Mirai
Status:
Malicious
First seen:
2026-02-07 14:22:54 UTC
File Type:
ELF32 Big (Exe)
AV detection:
18 of 24 (75.00%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:mirai botnet:owari linux
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

elf 083c9ebe27e1175659961a804f3e4d540e3d5eaebf733425bca65d5384f1c95c

(this sample)

  
Delivery method
Distributed via web download

Comments