MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 0ead112b89894f0fca5f0a351782009ebeebba7008938e30b71797bb1c4058ec. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 8


Intelligence 8 IOCs YARA File information Comments

SHA256 hash: 0ead112b89894f0fca5f0a351782009ebeebba7008938e30b71797bb1c4058ec
SHA3-384 hash: f1461589fe81f12fca23c7282de7df999cc6138e096e2ed6f2ddb578b96e5d118915c5860e5d334659ccf8fe76c94981
SHA1 hash: ea28a8dfc01a8db0206f84265ae7ec6c2073c292
MD5 hash: aecb27f116b0c1a0a75c8dc2572a29bc
humanhash: tango-october-robert-indigo
File name:ppc
Download: download sample
Signature Mirai
File size:66'792 bytes
First seen:2025-11-02 04:54:44 UTC
Last seen:Never
File type: elf
MIME type:application/x-executable
ssdeep 1536:nfsWxUorCdpXYJbRVCyYXkJLNNvnkXhq5GHs:kWx2uYXkJRVn2M
TLSH T1CF631A02771C0E57D5A7AEB0253F13E0D3BBA99021F4BA84251E9B969372E3251C6FCD
Magika elf
Reporter abuse_ch
Tags:elf mirai upx-dec


Avatar
abuse_ch
UPX decompressed file, sourced from SHA256 607ef3fb3bfc09c41edd15aebed6047a214d607e8f58459c550fbf24320321ee
File size (compressed) :33'380 bytes
File size (de-compressed) :66'792 bytes
Format:linux/ppc32
Packed file: 607ef3fb3bfc09c41edd15aebed6047a214d607e8f58459c550fbf24320321ee

Intelligence


File Origin
# of uploads :
1
# of downloads :
148
Origin country :
NL NL
Vendor Threat Intelligence
Result
Verdict:
Suspicious
Maliciousness:

Behaviour
Connection attempt
Sends data to a server
Receives data from a server
Creating a file
DNS request
Substitutes an application name
Verdict:
Malicious
File Type:
elf.32.be
First seen:
2025-11-02T02:41:00Z UTC
Last seen:
2025-11-02T03:17:00Z UTC
Hits:
~10
Status:
terminated
Behavior Graph:
%3 guuid=d8aa1740-1800-0000-c007-c7c7f90c0000 pid=3321 /usr/bin/sudo guuid=59495a42-1800-0000-c007-c7c7fc0c0000 pid=3324 /tmp/sample.bin guuid=d8aa1740-1800-0000-c007-c7c7f90c0000 pid=3321->guuid=59495a42-1800-0000-c007-c7c7fc0c0000 pid=3324 execve
Result
Threat name:
Detection:
malicious
Classification:
troj
Score:
68 / 100
Signature
Antivirus / Scanner detection for submitted sample
Manipulation of devices in /dev
Multi AV Scanner detection for submitted file
Yara detected Mirai
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1806378 Sample: ppc.elf Startdate: 02/11/2025 Architecture: LINUX Score: 68 21 flibberwock.cfd 185.14.92.55, 23, 34304, 34306 INTERCOLO-ASintercoloIP-BackboneDE Germany 2->21 23 109.202.202.202, 80 INIT7CH Switzerland 2->23 25 4 other IPs or domains 2->25 29 Antivirus / Scanner detection for submitted sample 2->29 31 Multi AV Scanner detection for submitted file 2->31 33 Yara detected Mirai 2->33 7 dash rm ppc.elf 2->7         started        9 dash rm 2->9         started        11 dash cut 2->11         started        13 7 other processes 2->13 signatures3 process4 process5 15 ppc.elf 7->15         started        file6 19 /dev/.392221, ASCII 15->19 dropped 27 Manipulation of devices in /dev 15->27 signatures7
Threat name:
Linux.Worm.Mirai
Status:
Malicious
First seen:
2025-11-02 04:56:05 UTC
File Type:
ELF32 Big (Exe)
AV detection:
15 of 24 (62.50%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:mirai linux
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

elf 0ead112b89894f0fca5f0a351782009ebeebba7008938e30b71797bb1c4058ec

(this sample)

  
Delivery method
Distributed via web download

Comments