MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 0b32acb4df943cdc2a3d1beffcc6af458e17d01e4d8aad4dd6b8d569a0ec6341. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 8


Intelligence 8 IOCs YARA File information Comments

SHA256 hash: 0b32acb4df943cdc2a3d1beffcc6af458e17d01e4d8aad4dd6b8d569a0ec6341
SHA3-384 hash: 4a8e18d4d289944a4e0472ac4764d78591d86fbbe7c951c75f9dffb4ad690167a152f30d70049fa51e560cd74d1de20a
SHA1 hash: 6038cb20d959fc99ba16e544f42c78c1a0313105
MD5 hash: 73b96400037eff61054e9b66b41df8e0
humanhash: mike-diet-kentucky-romeo
File name:vailon.arm5
Download: download sample
Signature Mirai
File size:27'476 bytes
First seen:2022-06-10 11:52:13 UTC
Last seen:2022-06-10 16:05:29 UTC
File type: elf
MIME type:application/x-executable
ssdeep 768:eLBtBSHAWANYYjh/b0nYXcq4DbzKKs3Uozb:ejBzZYq0dbzKHzb
TLSH T136C2E0608C57A8F0F939C435DF34C483A6CE1BB857FE316489482278D271691BBB965B
TrID 50.1% (.) ELF Executable and Linkable format (Linux) (4022/12)
49.8% (.O) ELF Executable and Linkable format (generic) (4000/1)
Reporter tolisec
Tags:mirai

Intelligence


File Origin
# of uploads :
5
# of downloads :
252
Origin country :
n/a
Vendor Threat Intelligence
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
anti-debug
Verdict:
Malicious
Uses P2P?:
false
Uses anti-vm?:
false
Architecture:
arm
Packer:
UPX
Botnet:
62.197.136.92/xnxx
Number of open files:
33
Number of processes launched:
6
Processes remaning?
false
Remote TCP ports scanned:
23
Behaviour
Information Gathering
Botnet C2s
TCP botnet C2(s):
62.197.136.92:9506
UDP botnet C2(s):
not identified
Result
Verdict:
UNKNOWN
Result
Threat name:
Unknown
Detection:
malicious
Classification:
troj.evad
Score:
56 / 100
Signature
Multi AV Scanner detection for submitted file
Sample is packed with UPX
Uses known network protocols on non-standard ports
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 643296 Sample: vailon.arm5 Startdate: 10/06/2022 Architecture: LINUX Score: 56 22 155.1.215.116 ZAMRENZM United States 2->22 24 185.210.161.46 XXLNETNL Russian Federation 2->24 26 98 other IPs or domains 2->26 28 Multi AV Scanner detection for submitted file 2->28 30 Uses known network protocols on non-standard ports 2->30 32 Sample is packed with UPX 2->32 8 vailon.arm5 2->8         started        signatures3 process4 process5 10 vailon.arm5 8->10         started        12 vailon.arm5 8->12         started        14 vailon.arm5 8->14         started        process6 16 vailon.arm5 10->16         started        18 vailon.arm5 10->18         started        20 vailon.arm5 10->20         started       
Threat name:
Linux.Trojan.Mirai
Status:
Malicious
First seen:
2022-06-10 11:53:07 UTC
File Type:
ELF32 Little (Exe)
AV detection:
13 of 39 (33.33%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  1/10
Tags:
linux
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

elf 0b32acb4df943cdc2a3d1beffcc6af458e17d01e4d8aad4dd6b8d569a0ec6341

(this sample)

  
Delivery method
Distributed via web download

Comments