MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 0e9ea4bff63ec8674c9ddac1667c83a0480fc67198411a75c9a1c0f88d80c044. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 9


Intelligence 9 IOCs YARA File information Comments

SHA256 hash: 0e9ea4bff63ec8674c9ddac1667c83a0480fc67198411a75c9a1c0f88d80c044
SHA3-384 hash: 55c85d2e5f5ea1f13b5b0848482119d917e37e4484a714e3fd1e0a623d196696e451aa98d3fafffa6086ef1bfb37cb1b
SHA1 hash: 3392b8294951e74d8ba4822511827a7c55e4dea3
MD5 hash: f5a8e1a8131169ced641c4d881ab353f
humanhash: vermont-whiskey-fish-tango
File name:ppc
Download: download sample
Signature Mirai
File size:63'584 bytes
First seen:2025-11-01 16:58:46 UTC
Last seen:Never
File type: elf
MIME type:application/x-executable
ssdeep 768:5zct1AHrk2di4xBqmW4M9mrIkKVRkQi5FNitSqWHqZXKIO/:xct1X4dimWXmkkKV+QYigtHqZXKH/
TLSH T19B533C42B31C0957D5B69DB0253F23E0D3BBE95020F4B688255E9B8A9371E3255C6FCE
Magika elf
Reporter abuse_ch
Tags:elf mirai upx-dec


Avatar
abuse_ch
UPX decompressed file, sourced from SHA256 cf00a56ec337b2d65c683a3ff6e573292225e03810ddeda2846c1e155070c0d2
File size (compressed) :32'016 bytes
File size (de-compressed) :63'584 bytes
Format:linux/ppc32
Packed file: cf00a56ec337b2d65c683a3ff6e573292225e03810ddeda2846c1e155070c0d2

Intelligence


File Origin
# of uploads :
1
# of downloads :
116
Origin country :
NL NL
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Connection attempt
DNS request
Receives data from a server
Opens a port
Sends data to a server
Substitutes an application name
Verdict:
Malicious
File Type:
elf.32.be
First seen:
2025-11-01T14:09:00Z UTC
Last seen:
2025-11-02T02:09:00Z UTC
Hits:
~10
Detections:
HEUR:Backdoor.Linux.Mirai.b
Status:
terminated
Behavior Graph:
%3 guuid=44404cfa-1800-0000-1487-63b80d0b0000 pid=2829 /usr/bin/sudo guuid=8ad5c7fc-1800-0000-1487-63b8150b0000 pid=2837 /tmp/sample.bin guuid=44404cfa-1800-0000-1487-63b80d0b0000 pid=2829->guuid=8ad5c7fc-1800-0000-1487-63b8150b0000 pid=2837 execve
Result
Threat name:
Detection:
malicious
Classification:
troj
Score:
64 / 100
Signature
Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Yara detected Mirai
Behaviour
Behavior Graph:
Threat name:
Linux.Worm.Mirai
Status:
Malicious
First seen:
2025-11-01 16:59:42 UTC
File Type:
ELF32 Big (Exe)
AV detection:
15 of 24 (62.50%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:mirai linux
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

elf 0e9ea4bff63ec8674c9ddac1667c83a0480fc67198411a75c9a1c0f88d80c044

(this sample)

  
Delivery method
Distributed via web download

Comments