MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 0cfd1137679e585d44e81f5c1470069c4cd20e1c9a26c9da835c2dde01bf7cb5. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 8


Intelligence 8 IOCs YARA 6 File information Comments

SHA256 hash: 0cfd1137679e585d44e81f5c1470069c4cd20e1c9a26c9da835c2dde01bf7cb5
SHA3-384 hash: 266733bf638d96cada828a125a905fbf0032f5f9fa4e065b25b2476d697f8f9d4032156baf5474574b4e45fe313580c5
SHA1 hash: f57ec60d34c0d82a6f52f7065b59ab379a99c5f9
MD5 hash: 996f9dc1decd653854e759639f136220
humanhash: comet-bakerloo-cat-hawaii
File name:x86
Download: download sample
Signature Mirai
File size:135'344 bytes
First seen:2025-10-19 21:59:07 UTC
Last seen:Never
File type: elf
MIME type:application/x-executable
ssdeep 3072:c3aSs4lQCNTAwpvCpvPGKs7Eh6KryKeOhuIeld:gRsGQaEdhXrIOwIel
TLSH T17AD36BC5E643D4F2F6A301F0112BD7714732E93A5026DA43E7B9AD36EC72991DA1A32C
telfhash t1087128b71aea0cdcbbd05401d28e2b71ad1de63f391036b506b3596027baf52616ac3d
TrID 50.1% (.) ELF Executable and Linkable format (Linux) (4022/12)
49.8% (.O) ELF Executable and Linkable format (generic) (4000/1)
Magika elf
Reporter abuse_ch
Tags:elf mirai

Intelligence


File Origin
# of uploads :
1
# of downloads :
52
Origin country :
DE DE
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Opens a port
Kills processes
Mounts file systems
Runs as daemon
Creating a file
Connection attempt
Substitutes an application name
Verdict:
Malicious
File Type:
elf.32.le
First seen:
2025-10-19T18:32:00Z UTC
Last seen:
2025-10-21T18:33:00Z UTC
Hits:
~10
Status:
terminated
Behavior Graph:
%3 guuid=21dd6e2b-1800-0000-1ae0-991d0f0e0000 pid=3599 /usr/bin/sudo guuid=3c331e2d-1800-0000-1ae0-991d160e0000 pid=3606 /tmp/sample.bin guuid=21dd6e2b-1800-0000-1ae0-991d0f0e0000 pid=3599->guuid=3c331e2d-1800-0000-1ae0-991d160e0000 pid=3606 execve guuid=145ee72d-1800-0000-1ae0-991d190e0000 pid=3609 /home/sandbox/ zombie guuid=3c331e2d-1800-0000-1ae0-991d160e0000 pid=3606->guuid=145ee72d-1800-0000-1ae0-991d190e0000 pid=3609 clone guuid=fa70ee2d-1800-0000-1ae0-991d1a0e0000 pid=3610 /home/sandbox/ delete-file zombie guuid=3c331e2d-1800-0000-1ae0-991d160e0000 pid=3606->guuid=fa70ee2d-1800-0000-1ae0-991d1a0e0000 pid=3610 clone guuid=834bf92d-1800-0000-1ae0-991d1b0e0000 pid=3611 /home/sandbox/ dns net send-data zombie guuid=3c331e2d-1800-0000-1ae0-991d160e0000 pid=3606->guuid=834bf92d-1800-0000-1ae0-991d1b0e0000 pid=3611 clone 8b0a01dc-0728-52c1-8024-c4ba7801b8d6 8.8.8.8:53 guuid=834bf92d-1800-0000-1ae0-991d1b0e0000 pid=3611->8b0a01dc-0728-52c1-8024-c4ba7801b8d6 send: 38B 54d92a3b-1447-55af-b534-047898c60c8d 1.1.1.1:53 guuid=834bf92d-1800-0000-1ae0-991d1b0e0000 pid=3611->54d92a3b-1447-55af-b534-047898c60c8d send: 38B 4a4ad612-f090-5acb-adab-bde4c6b24a65 bot.federalagent.xyz:13161 guuid=834bf92d-1800-0000-1ae0-991d1b0e0000 pid=3611->4a4ad612-f090-5acb-adab-bde4c6b24a65 send: 11B
Result
Threat name:
Detection:
malicious
Classification:
spre.troj
Score:
76 / 100
Signature
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Reads system files that contain records of logged in users
Sample reads /proc/mounts (often used for finding a writable filesystem)
Sample tries to kill multiple processes (SIGKILL)
Yara detected Gafgyt
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1797979 Sample: x86.elf Startdate: 20/10/2025 Architecture: LINUX Score: 76 138 Malicious sample detected (through community Yara rule) 2->138 140 Multi AV Scanner detection for submitted file 2->140 142 Yara detected Gafgyt 2->142 12 systemd gdm3 2->12         started        14 systemd gdm3 2->14         started        16 systemd gdm3 2->16         started        18 52 other processes 2->18 process3 file4 22 gdm3 gdm-session-worker 12->22         started        24 gdm3 gdm-session-worker 12->24         started        32 5 other processes 12->32 26 gdm3 gdm-session-worker 14->26         started        28 gdm3 gdm-session-worker 14->28         started        34 3 other processes 14->34 30 gdm3 gdm-session-worker 16->30         started        36 3 other processes 16->36 136 /var/log/wtmp, data 18->136 dropped 144 Sample reads /proc/mounts (often used for finding a writable filesystem) 18->144 146 Reads system files that contain records of logged in users 18->146 38 33 other processes 18->38 signatures5 process6 signatures7 41 gdm-session-worker gdm-x-session 22->41         started        43 gdm-session-worker gdm-wayland-session 24->43         started        45 gdm-session-worker gdm-wayland-session 26->45         started        47 gdm-session-worker gdm-x-session 28->47         started        49 gdm-session-worker gdm-wayland-session 30->49         started        150 Sample tries to kill multiple processes (SIGKILL) 38->150 51 x86.elf 38->51         started        53 sh grep 38->53         started        55 sh grep 38->55         started        57 25 other processes 38->57 process8 process9 59 gdm-x-session dbus-run-session 41->59         started        61 gdm-x-session Xorg Xorg.wrap Xorg 41->61         started        63 gdm-x-session Default 41->63         started        65 gdm-wayland-session dbus-run-session 43->65         started        67 gdm-wayland-session dbus-run-session 45->67         started        69 gdm-x-session dbus-run-session 47->69         started        76 2 other processes 47->76 71 gdm-wayland-session dbus-run-session 49->71         started        73 x86.elf 51->73         started        signatures10 78 dbus-run-session dbus-daemon 59->78         started        81 dbus-run-session gnome-session gnome-session-binary 59->81         started        83 Xorg sh 61->83         started        85 dbus-run-session dbus-daemon 65->85         started        87 dbus-run-session gnome-session gnome-session-binary 1 65->87         started        91 2 other processes 67->91 93 2 other processes 69->93 95 2 other processes 71->95 152 Sample tries to kill multiple processes (SIGKILL) 73->152 89 Xorg sh 76->89         started        process11 signatures12 154 Sample tries to kill multiple processes (SIGKILL) 78->154 156 Sample reads /proc/mounts (often used for finding a writable filesystem) 78->156 105 8 other processes 78->105 107 3 other processes 81->107 97 sh xkbcomp 83->97         started        109 7 other processes 85->109 111 2 other processes 87->111 99 sh xkbcomp 89->99         started        113 9 other processes 91->113 101 gnome-session-binary gnome-session-check-accelerated 93->101         started        103 dbus-daemon 95->103         started        process13 process14 115 dbus-daemon false 103->115         started        117 dbus-daemon at-spi-bus-launcher 105->117         started        125 7 other processes 105->125 127 2 other processes 107->127 119 dbus-daemon false 109->119         started        121 dbus-daemon false 109->121         started        123 dbus-daemon false 109->123         started        129 4 other processes 109->129 131 7 other processes 113->131 process15 133 at-spi-bus-launcher dbus-daemon 117->133         started        signatures16 148 Sample reads /proc/mounts (often used for finding a writable filesystem) 133->148
Threat name:
Linux.Worm.Mirai
Status:
Malicious
First seen:
2025-10-19 22:00:52 UTC
File Type:
ELF32 Little (Exe)
AV detection:
18 of 37 (48.65%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
discovery linux
Behaviour
Reads runtime system information
Changes its process name
Enumerates running processes
Renames itself
Verdict:
Unknown
Tags:
trojan mirai gafgyt
YARA:
Linux_Trojan_Gafgyt_5bf62ce4 Linux_Trojan_Mirai_389ee3e9
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:ELF_Mirai
Author:NDA0E
Description:Detects multiple Mirai variants
Rule name:linux_generic_ipv6_catcher
Author:@_lubiedo
Description:ELF samples using IPv6 addresses
Rule name:Linux_Trojan_Gafgyt_5bf62ce4
Author:Elastic Security
Rule name:Linux_Trojan_Mirai_389ee3e9
Author:Elastic Security
Rule name:unixredflags3
Author:Tim Brown @timb_machine
Description:Hunts for UNIX red flags
Rule name:VPNFilterStage3PluginTor

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

elf 0cfd1137679e585d44e81f5c1470069c4cd20e1c9a26c9da835c2dde01bf7cb5

(this sample)

  
Delivery method
Distributed via web download

Comments