MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 0c2fc7a67744d1f8f7c1e65c74d33eca19ee18aba95ca6f60d66d967ffd2c738. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 9


Intelligence 9 IOCs YARA File information Comments

SHA256 hash: 0c2fc7a67744d1f8f7c1e65c74d33eca19ee18aba95ca6f60d66d967ffd2c738
SHA3-384 hash: 7e3a59c25dab0002ff9344db8501ab189d3fc070e61d84d16d8975b05a21fbd248484ef6365c615962065737c45bd02e
SHA1 hash: d2e7f46fc9b698960cb08efb4b7452c4d3a4237e
MD5 hash: fcb2526b9be74f72fcd68fd3f2cb07bb
humanhash: hamper-three-triple-april
File name:mips
Download: download sample
Signature Mirai
File size:73'340 bytes
First seen:2025-12-04 03:12:13 UTC
Last seen:Never
File type: elf
MIME type:application/x-executable
ssdeep 768:4jEjlaB1YS3Mi0c6IBSTn94PuRMeQfWjylphK5uLHeF1gv3ttDWeACmknJv9CSjL:CC63MKWnHf2mknJv9CO47SB0ezjoE
TLSH T19563D95A3E319FECFBA982354BB38E21675C23CA26E1C5C5D19CD6011E7034E245FBA8
telfhash t1c3016d5c883852f0e7a51d9d7bedfe77d45160df0a21af378d00fe69aa258428e00c2c
Magika elf
Reporter abuse_ch
Tags:elf mirai

Intelligence


File Origin
# of uploads :
1
# of downloads :
56
Origin country :
DE DE
Vendor Threat Intelligence
Malware configuration found for:
Mirai
Details
Mirai
an XOR decryption key and at least a c2 socket address
Gathering data
Result
Verdict:
Malware
Maliciousness:

Behaviour
Runs as daemon
Opens a port
Sends data to a server
Connection attempt
Substitutes an application name
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
mirai
Result
Gathering data
Result
Threat name:
Detection:
malicious
Classification:
troj
Score:
64 / 100
Signature
Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Yara detected Mirai
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1826037 Sample: mips.elf Startdate: 04/12/2025 Architecture: LINUX Score: 64 15 109.202.202.202, 80 INIT7CH Switzerland 2->15 17 91.189.91.42, 443 CANONICAL-ASGB United Kingdom 2->17 19 3 other IPs or domains 2->19 21 Antivirus / Scanner detection for submitted sample 2->21 23 Multi AV Scanner detection for submitted file 2->23 25 Yara detected Mirai 2->25 7 mips.elf 2->7         started        9 dash rm 2->9         started        11 dash rm 2->11         started        signatures3 process4 process5 13 mips.elf 7->13         started       
Threat name:
Linux.Worm.Mirai
Status:
Malicious
First seen:
2025-12-04 03:12:22 UTC
File Type:
ELF32 Big (Exe)
AV detection:
23 of 36 (63.89%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:mirai discovery
Behaviour
System Network Configuration Discovery
Changes its process name
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

elf 0c2fc7a67744d1f8f7c1e65c74d33eca19ee18aba95ca6f60d66d967ffd2c738

(this sample)

  
Delivery method
Distributed via web download

Comments