MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 0bb6d6ef3f916ad9acfd4ffdb9f7ed980b7841879242cc4a0c752cdfe3eee883. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: 0bb6d6ef3f916ad9acfd4ffdb9f7ed980b7841879242cc4a0c752cdfe3eee883
SHA3-384 hash: 104ba823104e3d5c36d1e598da92944362a1d98f03d90e6b0d0d908bf75fdcc3d43ea593d9476a7ebfb23a8c828cc3d7
SHA1 hash: 5c21c9c1a7364dc42f4e93feb99abb03ebe337d0
MD5 hash: 168160a291698c4bab0f26a4173c6ca8
humanhash: network-table-twenty-vermont
File name:main.ppc
Download: download sample
Signature Mirai
File size:134'036 bytes
First seen:2025-01-04 13:26:44 UTC
Last seen:Never
File type: elf
MIME type:application/x-executable
ssdeep 1536:FQ4XgYOclzaOrjLBqaxFB6xNVRAmB93LnErM/qSvAVyXGrQ+bopqHqRZoW:edkqaxKxNDLErM4wtOW
TLSH T1FCD33A06730C0A47D2632EB03A3F67E193EF9AC121E4F644355F9B8A95B1E325586ECD
Magika elf
Reporter abuse_ch
Tags:elf mirai

Intelligence


File Origin
# of uploads :
1
# of downloads :
136
Origin country :
DE DE
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Connection attempt
DNS request
Receives data from a server
Sends data to a server
Creating a file
Runs as daemon
Substitutes an application name
Deleting of the original file
Verdict:
Unknown
Threat level:
  0/10
Confidence:
100%
Tags:
anti-debug bash lolbin masquerade remote
Result
Verdict:
UNKNOWN
Result
Threat name:
Detection:
malicious
Classification:
troj.evad
Score:
76 / 100
Signature
Antivirus / Scanner detection for submitted sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Sample deletes itself
Yara detected Mirai
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1584164 Sample: main.ppc.elf Startdate: 04/01/2025 Architecture: LINUX Score: 76 21 lemonsmp.work.gd 102.211.232.40, 35852, 3778 CKL1-ASNKE unknown 2->21 23 Malicious sample detected (through community Yara rule) 2->23 25 Antivirus / Scanner detection for submitted sample 2->25 27 Multi AV Scanner detection for submitted file 2->27 29 Yara detected Mirai 2->29 8 main.ppc.elf 2->8         started        11 systemd snap-failure 2->11         started        signatures3 process4 signatures5 31 Sample deletes itself 8->31 13 main.ppc.elf 8->13         started        15 snap-failure systemctl 11->15         started        17 snap-failure 11->17         started        process6 process7 19 main.ppc.elf 13->19         started       
Threat name:
Linux.Backdoor.Mirai
Status:
Malicious
First seen:
2025-01-04 13:27:09 UTC
File Type:
ELF32 Big (Exe)
AV detection:
14 of 38 (36.84%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  1/10
Tags:
linux
Verdict:
Malicious
Tags:
trojan gafgyt Unix.Trojan.Mirai-9441505-0
YARA:
Linux_Trojan_Gafgyt_28a2fe0c Linux_Trojan_Gafgyt_ea92cca8 Linux_Gafgyt_May_2024
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

elf 0bb6d6ef3f916ad9acfd4ffdb9f7ed980b7841879242cc4a0c752cdfe3eee883

(this sample)

  
Delivery method
Distributed via web download

Comments