MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 0cc752aefc0a66b61c9d834e2cb14ac5d1a65a02f878b4884262597e06ada71d. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 9


Intelligence 9 IOCs YARA 7 File information Comments

SHA256 hash: 0cc752aefc0a66b61c9d834e2cb14ac5d1a65a02f878b4884262597e06ada71d
SHA3-384 hash: 7f300554d4348aa4b4dada732e6f5b705b600f1b5ac86ad9bcf6271506c5807dfd46ab3635bba2c1ca3bd616a3c349eb
SHA1 hash: 77bec5cd5155c1f8bb2026d1130e33522ea4f922
MD5 hash: f69d9142fb4d5361d18661bc45803afb
humanhash: bakerloo-hot-moon-black
File name:x86_64
Download: download sample
Signature Mirai
File size:1'249'072 bytes
First seen:2025-05-20 17:32:50 UTC
Last seen:Never
File type: elf
MIME type:application/x-executable
ssdeep 24576:1h29TG6I+FicSxh/Ck/AxV9ejAp2Wx68TP20:1h29TG6I+FicO/Ck/Axuj0x68T
TLSH T13B457D5AB7F364FDC193C13107DB9B62AA3AF07902125E7B2184E5343E46E902F19B67
telfhash t1fef0a6a04a7d40800d62ec009c5211ff5eebe6aa1e81f945fb8addc52c6e01dfb43e4b
TrID 50.1% (.) ELF Executable and Linkable format (Linux) (4022/12)
49.8% (.O) ELF Executable and Linkable format (generic) (4000/1)
Magika elf
Reporter abuse_ch
Tags:elf mirai

Intelligence


File Origin
# of uploads :
1
# of downloads :
108
Origin country :
DE DE
Vendor Threat Intelligence
Result
Verdict:
Suspicious
Maliciousness:

Behaviour
Creates directories in a subdirectory of a temporary directory
Creating a file in the %temp% subdirectories
Creates directories
Creating a file
Sets a written file as executable
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
gcc lolbin remote
Result
Threat name:
n/a
Detection:
malicious
Classification:
troj.evad
Score:
68 / 100
Signature
Drops files in suspicious directories
Drops invisible ELF files
Malicious sample detected (through community Yara rule)
Sample tries to persist itself using .desktop files
Writes ELF files to hidden directories
Writes identical ELF files to multiple locations
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1695292 Sample: x86_64.elf Startdate: 20/05/2025 Architecture: LINUX Score: 68 151 185.125.190.26, 443 CANONICAL-ASGB United Kingdom 2->151 153 daisy.ubuntu.com 2->153 163 Malicious sample detected (through community Yara rule) 2->163 15 x86_64.elf 2->15         started        signatures3 process4 file5 143 /tmp/vmware-root_7...ig/.update-18da5f84, ELF 15->143 dropped 145 /root/snap/.config/.update-2e6dc9d1, ELF 15->145 dropped 147 /root/snap/.cache/.update-4f71663a, ELF 15->147 dropped 149 4 other malicious files 15->149 dropped 155 Writes ELF files to hidden directories 15->155 157 Writes identical ELF files to multiple locations 15->157 159 Sample tries to persist itself using .desktop files 15->159 161 Drops invisible ELF files 15->161 19 x86_64.elf 15->19         started        signatures6 process7 process8 21 x86_64.elf 19->21         started        file9 81 /usr/local/sbin/update, ELF 21->81 dropped 83 /usr/local/sbin/lists, ELF 21->83 dropped 167 Writes identical ELF files to multiple locations 21->167 25 x86_64.elf update 21->25         started        29 x86_64.elf lists 21->29         started        signatures10 process11 file12 93 /root/snap/.config...rt/.update-11728bcb, ELF 25->93 dropped 95 /root/snap/.config/.update-16691c4a, ELF 25->95 dropped 97 /root/snap/.cache/.update-341d2718, ELF 25->97 dropped 105 4 other malicious files 25->105 dropped 177 Writes ELF files to hidden directories 25->177 179 Writes identical ELF files to multiple locations 25->179 181 Sample tries to persist itself using .desktop files 25->181 31 update 25->31         started        99 /root/snap/.config...rt/.update-1c5be10b, ELF 29->99 dropped 101 /root/snap/.config/.update-50ae71c0, ELF 29->101 dropped 103 /root/snap/.cache/.update-305d663b, ELF 29->103 dropped 107 4 other malicious files 29->107 dropped 183 Drops invisible ELF files 29->183 33 lists 29->33         started        signatures13 process14 process15 35 update 31->35         started        39 lists 33->39         started        file16 73 /usr/local/sbin/servers, ELF 35->73 dropped 75 /usr/local/bin/update, ELF 35->75 dropped 165 Writes identical ELF files to multiple locations 35->165 41 update servers 35->41         started        45 update update 35->45         started        77 /usr/local/sbin/updater, ELF 39->77 dropped 79 /usr/local/bin/lists, ELF 39->79 dropped 47 lists updater 39->47         started        49 lists lists 39->49         started        signatures17 process18 file19 109 /root/snap/.config...rt/.update-29871a5a, ELF 41->109 dropped 111 /root/snap/.config/.update-9dafb3c, ELF 41->111 dropped 119 5 other malicious files 41->119 dropped 185 Writes ELF files to hidden directories 41->185 187 Writes identical ELF files to multiple locations 41->187 189 Sample tries to persist itself using .desktop files 41->189 51 servers 41->51         started        113 /root/snap/.config...rt/.update-1409c68f, ELF 45->113 dropped 121 6 other malicious files 45->121 dropped 53 update 45->53         started        115 /root/snap/.config...rt/.update-1c5be163, ELF 47->115 dropped 123 6 other malicious files 47->123 dropped 191 Drops invisible ELF files 47->191 55 updater 47->55         started        117 /root/snap/.config...rt/.update-37c240cc, ELF 49->117 dropped 125 6 other malicious files 49->125 dropped 57 lists 49->57         started        signatures20 process21 process22 59 servers 51->59         started        63 update 53->63         started        65 updater 55->65         started        67 lists 57->67         started        file23 127 /usr/sbin/update, ELF 59->127 dropped 129 /usr/local/bin/servers, ELF 59->129 dropped 193 Writes identical ELF files to multiple locations 59->193 195 Drops files in suspicious directories 59->195 69 servers servers 59->69         started        131 /usr/sbin/lists, ELF 63->131 dropped 133 /usr/bin/update, ELF 63->133 dropped 135 /usr/sbin/servers, ELF 65->135 dropped 137 /usr/local/bin/updater, ELF 65->137 dropped 139 /usr/sbin/updater, ELF 67->139 dropped 141 /usr/bin/lists, ELF 67->141 dropped signatures24 process25 file26 85 /root/snap/.config...rt/.update-261c92b3, ELF 69->85 dropped 87 /root/snap/.config/.update-4bdeb971, ELF 69->87 dropped 89 /root/snap/.cache/.update-66a20a06, ELF 69->89 dropped 91 4 other malicious files 69->91 dropped 169 Writes ELF files to hidden directories 69->169 171 Writes identical ELF files to multiple locations 69->171 173 Sample tries to persist itself using .desktop files 69->173 175 Drops invisible ELF files 69->175 signatures27
Threat name:
Linux.Trojan.SAgnt
Status:
Malicious
First seen:
2025-05-20 17:24:16 UTC
File Type:
ELF64 Little (Exe)
AV detection:
16 of 37 (43.24%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  6/10
Tags:
defense_evasion execution linux persistence privilege_escalation
Behaviour
Writes file to shm directory
Writes file to tmp directory
Creates .desktop file
Modifies Bash startup script
Creates/modifies environment variables
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:F01_s1ckrule
Author:s1ckb017
Rule name:ldpreload
Author:xorseed
Reference:https://stuff.rop.io/
Rule name:Linux_Hacktool_Flooder_1bf0e994
Author:Elastic Security
Rule name:malwareelf55503
Rule name:meth_stackstrings
Author:Willi Ballenthin
Rule name:setsockopt
Author:Tim Brown @timb_machine
Description:Hunts for setsockopt() red flags
Rule name:unixredflags3
Author:Tim Brown @timb_machine
Description:Hunts for UNIX red flags

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

elf 0cc752aefc0a66b61c9d834e2cb14ac5d1a65a02f878b4884262597e06ada71d

(this sample)

  
Delivery method
Distributed via web download

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_PIEMissing Position-Independent Executable (PIE) Protectionhigh

Comments