MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 0bfd4a0db43370d7fafc548626a96aa0fbb22a13f517499cc10f357825fa0e37. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 13


Intelligence 13 IOCs YARA 3 File information Comments

SHA256 hash: 0bfd4a0db43370d7fafc548626a96aa0fbb22a13f517499cc10f357825fa0e37
SHA3-384 hash: cf75831c961b65d2e0079b0ba3a203121d7814aa32e3e2c5458cfdb28b104726b5c685956981454977a4f79667f24bc1
SHA1 hash: 38f254749f13f6c2597cb1af5b2af5b9c5885cd0
MD5 hash: ef53e6975385738b2e232d3bfee461e6
humanhash: monkey-monkey-five-ink
File name:upjohn90.x86
Download: download sample
Signature Mirai
File size:40'252 bytes
First seen:2025-07-26 16:48:16 UTC
Last seen:Never
File type: elf
MIME type:application/x-executable
ssdeep 768:OpeixlzEu+9EpYqRlC+Xd47PckWhR9edO5/EKAQLqvPnbcuyD7UGQRj2/:G9xlzeEptRE4aUk09YOiQLqvPnouy8Gp
TLSH T1AE0302259161BFE3F47AC3B2495D364968F8D0AE212245A3C120B19F2C42F7F5E38BD2
TrID 50.1% (.) ELF Executable and Linkable format (Linux) (4022/12)
49.8% (.O) ELF Executable and Linkable format (generic) (4000/1)
Magika elf
Reporter abuse_ch
Tags:elf mirai

Intelligence


File Origin
# of uploads :
1
# of downloads :
21
Origin country :
DE DE
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Receives data from a server
Kills processes
Sets a written file as executable
DNS request
Runs as daemon
Sends data to a server
Connection attempt
Launching a process
Substitutes an application name
Creates or modifies files in /init.d to set up autorun
Creates or modifies symbolic links in /init.d to set up autorun
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
masquerade mirai packed upx
Verdict:
Malicious
Uses P2P?:
false
Uses anti-vm?:
false
Architecture:
x86
Packer:
UPX
Botnet:
196.251.116.34/bins
Number of open files:
0
Number of processes launched:
3
Processes remaning?
false
Remote TCP ports scanned:
not identified
Behaviour
no suspicious findings
Botnet C2s
TCP botnet C2(s):
not identified
UDP botnet C2(s):
not identified
Status:
terminated
Behavior Graph:
%3 guuid=fa70d1ed-1600-0000-3d14-bc5cbd0c0000 pid=3261 /usr/bin/sudo guuid=d3df94ef-1600-0000-3d14-bc5cc20c0000 pid=3266 /tmp/sample.bin net guuid=fa70d1ed-1600-0000-3d14-bc5cbd0c0000 pid=3261->guuid=d3df94ef-1600-0000-3d14-bc5cc20c0000 pid=3266 execve 8b0a01dc-0728-52c1-8024-c4ba7801b8d6 8.8.8.8:53 guuid=d3df94ef-1600-0000-3d14-bc5cc20c0000 pid=3266->8b0a01dc-0728-52c1-8024-c4ba7801b8d6 con guuid=cd252ef0-1600-0000-3d14-bc5cc50c0000 pid=3269 /tmp/sample.bin guuid=d3df94ef-1600-0000-3d14-bc5cc20c0000 pid=3266->guuid=cd252ef0-1600-0000-3d14-bc5cc50c0000 pid=3269 clone guuid=212346f0-1600-0000-3d14-bc5cc60c0000 pid=3270 /tmp/sample.bin write-config zombie guuid=cd252ef0-1600-0000-3d14-bc5cc50c0000 pid=3269->guuid=212346f0-1600-0000-3d14-bc5cc60c0000 pid=3270 clone guuid=74434df3-1600-0000-3d14-bc5cd30c0000 pid=3283 /usr/bin/dash guuid=212346f0-1600-0000-3d14-bc5cc60c0000 pid=3270->guuid=74434df3-1600-0000-3d14-bc5cd30c0000 pid=3283 execve guuid=6a3f8df5-1600-0000-3d14-bc5cdc0c0000 pid=3292 /tmp/sample.bin net send-data zombie guuid=212346f0-1600-0000-3d14-bc5cc60c0000 pid=3270->guuid=6a3f8df5-1600-0000-3d14-bc5cdc0c0000 pid=3292 clone guuid=ddd67df3-1600-0000-3d14-bc5cd50c0000 pid=3285 /usr/bin/cp guuid=74434df3-1600-0000-3d14-bc5cd30c0000 pid=3283->guuid=ddd67df3-1600-0000-3d14-bc5cd50c0000 pid=3285 execve guuid=6a3f8df5-1600-0000-3d14-bc5cdc0c0000 pid=3292->8b0a01dc-0728-52c1-8024-c4ba7801b8d6 send: 2545B 310a0ed0-c544-54ca-bf3f-fca55e459297 65.222.202.53:80 guuid=6a3f8df5-1600-0000-3d14-bc5cdc0c0000 pid=3292->310a0ed0-c544-54ca-bf3f-fca55e459297 send: 2B guuid=0d6bb0f5-1600-0000-3d14-bc5cdd0c0000 pid=3293 /tmp/sample.bin guuid=6a3f8df5-1600-0000-3d14-bc5cdc0c0000 pid=3292->guuid=0d6bb0f5-1600-0000-3d14-bc5cdd0c0000 pid=3293 clone guuid=61a4b7f5-1600-0000-3d14-bc5cde0c0000 pid=3294 /tmp/sample.bin guuid=6a3f8df5-1600-0000-3d14-bc5cdc0c0000 pid=3292->guuid=61a4b7f5-1600-0000-3d14-bc5cde0c0000 pid=3294 clone
Result
Threat name:
n/a
Detection:
malicious
Classification:
troj.evad
Score:
72 / 100
Signature
Drops files in suspicious directories
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Sample is packed with UPX
Sample tries to persist itself using System V runlevels
Sample tries to set files in /etc globally writable
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1744720 Sample: upjohn90.x86.elf Startdate: 26/07/2025 Architecture: LINUX Score: 72 34 65.222.202.53, 80 CAPEREGIONALHEALTHSYSTEMUS United States 2->34 36 185.125.190.26, 443 CANONICAL-ASGB United Kingdom 2->36 38 54.217.10.153, 37678, 443 AMAZON-02US United States 2->38 40 Malicious sample detected (through community Yara rule) 2->40 42 Multi AV Scanner detection for submitted file 2->42 44 Sample is packed with UPX 2->44 10 upjohn90.x86.elf 2->10         started        12 dash rm 2->12         started        14 dash rm 2->14         started        signatures3 process4 process5 16 upjohn90.x86.elf 10->16         started        process6 18 upjohn90.x86.elf 16->18         started        file7 32 /etc/init.d/sysd, POSIX 18->32 dropped 46 Sample tries to set files in /etc globally writable 18->46 48 Drops files in suspicious directories 18->48 50 Sample tries to persist itself using System V runlevels 18->50 22 upjohn90.x86.elf sh 18->22         started        24 upjohn90.x86.elf 18->24         started        signatures8 process9 process10 26 sh cp 22->26         started        28 upjohn90.x86.elf 24->28         started        30 upjohn90.x86.elf 24->30         started       
Verdict:
Malicious
Threat:
HEUR:Backdoor.Linux.Gafgyt
Threat name:
Linux.Worm.Mirai
Status:
Malicious
First seen:
2025-07-26 07:06:49 UTC
File Type:
ELF32 Little (Exe)
AV detection:
20 of 37 (54.05%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:mirai botnet credential_access discovery linux persistence upx
Behaviour
Reads runtime system information
Changes its process name
Reads system network configuration
Reads process memory
Enumerates active TCP sockets
Enumerates running processes
Modifies init.d
Modifies rc script
Mirai
Mirai family
Verdict:
Malicious
Tags:
Unix.Dropper.Mirai-7135858-0
YARA:
n/a
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:SUSP_ELF_LNX_UPX_Compressed_File
Author:Florian Roth (Nextron Systems)
Description:Detects a suspicious ELF binary with UPX compression
Reference:Internal Research
Rule name:Sus_Obf_Enc_Spoof_Hide_PE
Author:XiAnzheng
Description:Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP)
Rule name:upx_packed_elf_v1
Author:RandomMalware

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

elf 0bfd4a0db43370d7fafc548626a96aa0fbb22a13f517499cc10f357825fa0e37

(this sample)

  
Delivery method
Distributed via web download

Comments