MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 10794f7fb6ba4b796146a6b1f289b9e8699b4048fedfd50b678b47ce9b25f891. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 10


Intelligence 10 IOCs YARA File information Comments

SHA256 hash: 10794f7fb6ba4b796146a6b1f289b9e8699b4048fedfd50b678b47ce9b25f891
SHA3-384 hash: 7374ae167a404c0303b60b23a0f4afb82ff54d169109bac07306781429f0e00d5dcd0e620762ca39e92a836f901978d4
SHA1 hash: 321836e9f19d483517d1f863f048908959337c48
MD5 hash: 0c0d8dc1ac7c884f698e95dc5ef6199b
humanhash: island-bravo-angel-potato
File name:sh4
Download: download sample
Signature Mirai
File size:33'612 bytes
First seen:2025-12-19 12:09:10 UTC
Last seen:Never
File type: elf
MIME type:application/x-executable
ssdeep 384:bAflUMkNhj3U6+bhgAeWWjhrF/YwI2OOTylJCMDtLBFrXEr3KSNpog/sqB0zaCvY:bAfhkNhjA0LdYwhylJCe2poYsTuCyD
TLSH T11DE28EB3C02AAD48D598C67865616FB42763F005C3671FFA5A6A82A6C007DFCF5093F5
TrID 50.1% (.) ELF Executable and Linkable format (Linux) (4022/12)
49.8% (.O) ELF Executable and Linkable format (generic) (4000/1)
Magika elf
Reporter abuse_ch
Tags:elf mirai

Intelligence


File Origin
# of uploads :
1
# of downloads :
89
Origin country :
DE DE
Vendor Threat Intelligence
Malware configuration found for:
Mirai
Details
Mirai
a c2 socket address and a scan socket address
Verdict:
Malicious
File Type:
elf.32.le
First seen:
2025-12-19T09:16:00Z UTC
Last seen:
2025-12-19T12:48:00Z UTC
Hits:
~10
Detections:
HEUR:Backdoor.Linux.Mirai.b
Status:
terminated
Behavior Graph:
%3 guuid=d92a3009-1a00-0000-a4c4-9819bd090000 pid=2493 /usr/bin/sudo guuid=1b9cc70a-1a00-0000-a4c4-9819c3090000 pid=2499 /tmp/sample.bin guuid=d92a3009-1a00-0000-a4c4-9819bd090000 pid=2493->guuid=1b9cc70a-1a00-0000-a4c4-9819c3090000 pid=2499 execve
Result
Threat name:
Detection:
malicious
Classification:
troj.evad
Score:
60 / 100
Signature
Multi AV Scanner detection for submitted file
Sample deletes itself
Yara detected Moobot
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1836237 Sample: sh4.elf Startdate: 19/12/2025 Architecture: LINUX Score: 60 12 45.194.92.12, 32122, 35434, 35436 DXTL-HKDXTLTseungKwanOServiceHK Seychelles 2->12 14 Multi AV Scanner detection for submitted file 2->14 16 Yara detected Moobot 2->16 7 sh4.elf 2->7         started        signatures3 process4 signatures5 18 Sample deletes itself 7->18 10 sh4.elf 7->10         started        process6
Threat name:
Linux.Worm.Mirai
Status:
Malicious
First seen:
2025-12-19 12:10:24 UTC
File Type:
ELF32 Little (Exe)
AV detection:
14 of 24 (58.33%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:mirai linux
Malware Config
C2 Extraction:
hoon.cyberium.cc
Verdict:
Malicious
Tags:
Unix.Trojan.Mirai-7138377-0
YARA:
n/a
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

elf 10794f7fb6ba4b796146a6b1f289b9e8699b4048fedfd50b678b47ce9b25f891

(this sample)

  
Delivery method
Distributed via web download

Comments