MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 163bbcef43c6f5c9d00ae1e62b9b0f0438395f6c3917b51212fbc28118ecd24b. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 9


Intelligence 9 IOCs YARA File information Comments

SHA256 hash: 163bbcef43c6f5c9d00ae1e62b9b0f0438395f6c3917b51212fbc28118ecd24b
SHA3-384 hash: eca381b2dcf6dcd82b20e25d301485aad84fcbf1718c2e4d4273ff40a5fb921dada80a35704df97e3abdcc7323a554a7
SHA1 hash: 19e898b15227563c0a999956ac84b6bd1be3e6f6
MD5 hash: 4338063d1e6899da5173bc913cff5fdc
humanhash: sink-iowa-robin-sink
File name:jew.ppc
Download: download sample
Signature Mirai
File size:60'040 bytes
First seen:2025-12-02 03:30:49 UTC
Last seen:Never
File type: elf
MIME type:application/x-executable
ssdeep 1536:1t1JILhthQ+1r4atGKmifAKWNGa6d42+8/:1ufh/w4AK+G1P/
TLSH T173433B03322C0E17D9A21EB0353F06E093BFF95126E1B68A254FDB664639E7615C2F9D
Magika elf
Reporter abuse_ch
Tags:elf mirai

Intelligence


File Origin
# of uploads :
1
# of downloads :
68
Origin country :
DE DE
Vendor Threat Intelligence
Malware configuration found for:
Mirai
Details
Mirai
an XOR decryption key and at least a c2 socket address
Verdict:
Unknown
Threat level:
  0/10
Confidence:
100%
Tags:
masquerade
Result
Gathering data
Result
Threat name:
n/a
Detection:
malicious
Classification:
n/a
Score:
56 / 100
Signature
Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1824094 Sample: jew.ppc.elf Startdate: 02/12/2025 Architecture: LINUX Score: 56 22 185.134.28.100, 23 ZITCOMDK Denmark 2->22 24 206.146.2.20 ZAYO-MNUS United States 2->24 26 98 other IPs or domains 2->26 28 Antivirus / Scanner detection for submitted sample 2->28 30 Multi AV Scanner detection for submitted file 2->30 8 jew.ppc.elf 2->8         started        10 dash rm 2->10         started        12 dash rm 2->12         started        signatures3 process4 process5 14 jew.ppc.elf 8->14         started        16 jew.ppc.elf 8->16         started        process6 18 jew.ppc.elf 14->18         started        20 jew.ppc.elf 14->20         started       
Threat name:
Linux.Worm.Mirai
Status:
Malicious
First seen:
2025-12-02 03:31:32 UTC
File Type:
ELF32 Big (Exe)
AV detection:
19 of 36 (52.78%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:mirai botnet:kurc linux
Verdict:
Malicious
Tags:
Unix.Dropper.Mirai-7135870-0
YARA:
n/a
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

elf 163bbcef43c6f5c9d00ae1e62b9b0f0438395f6c3917b51212fbc28118ecd24b

(this sample)

  
Delivery method
Distributed via web download

Comments