MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 1ca4d27101849db0b20b2e17b4cb430ca7f895c83df304e54bce4aea025e6667. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 9


Intelligence 9 IOCs YARA File information Comments

SHA256 hash: 1ca4d27101849db0b20b2e17b4cb430ca7f895c83df304e54bce4aea025e6667
SHA3-384 hash: 96d83816354db8b66cb3adf16159d1895df4e9d6d648bf32ca98d4295d0e76a118e5681e66b86045371482fd59c2ee95
SHA1 hash: 23aa43d0fa5ea3b5c58eed85621aca281693f413
MD5 hash: 609d8e836c965c2a33f86d186c6620fc
humanhash: princess-pizza-crazy-leopard
File name:boatnet.m68k
Download: download sample
Signature Mirai
File size:53'024 bytes
First seen:2026-01-30 15:08:43 UTC
Last seen:2026-01-30 17:22:58 UTC
File type: elf
MIME type:application/x-executable
ssdeep 1536:qN477eh2D9fV7HgEgc8eh1gBUxCWQ1v3d:qU9fFHgxGu5W+1
TLSH T1ED331AD6B5029DBCF95BEBBA8413460AF531B7561083063763BBFC53AC361A44E23D85
Magika elf
Reporter abuse_ch
Tags:elf mirai

Intelligence


File Origin
# of uploads :
2
# of downloads :
52
Origin country :
DE DE
Vendor Threat Intelligence
Malware configuration found for:
Mirai
Details
Mirai
an XOR decryption key and at least a c2 socket address
Verdict:
Unknown
Threat level:
  0/10
Confidence:
100%
Tags:
masquerade mirai
Result
Gathering data
Verdict:
Malicious
File Type:
elf.32.be
First seen:
2026-01-30T08:05:00Z UTC
Last seen:
2026-01-30T08:37:00Z UTC
Hits:
~10
Detections:
HEUR:Backdoor.Linux.Mirai.b
Status:
terminated
Behavior Graph:
%3 guuid=aa71a094-1900-0000-2de9-356cfe080000 pid=2302 /usr/bin/sudo guuid=01c1f697-1900-0000-2de9-356c04090000 pid=2308 /tmp/sample.bin guuid=aa71a094-1900-0000-2de9-356cfe080000 pid=2302->guuid=01c1f697-1900-0000-2de9-356c04090000 pid=2308 execve
Result
Threat name:
n/a
Detection:
malicious
Classification:
spre
Score:
60 / 100
Signature
Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Sample tries to kill multiple processes (SIGKILL)
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1860576 Sample: boatnet.m68k.elf Startdate: 30/01/2026 Architecture: LINUX Score: 60 24 169.254.169.254, 80 USDOSUS Reserved 2->24 26 109.202.202.202, 80 INIT7CH Switzerland 2->26 28 5 other IPs or domains 2->28 30 Antivirus / Scanner detection for submitted sample 2->30 32 Multi AV Scanner detection for submitted file 2->32 7 boatnet.m68k.elf 2->7         started        9 xfce4-panel wrapper-2.0 2->9         started        11 xfce4-panel wrapper-2.0 2->11         started        13 9 other processes 2->13 signatures3 process4 process5 15 boatnet.m68k.elf 7->15         started        18 boatnet.m68k.elf 7->18         started        20 boatnet.m68k.elf 7->20         started        22 wrapper-2.0 xfpm-power-backlight-helper 9->22         started        signatures6 34 Sample tries to kill multiple processes (SIGKILL) 15->34
Gathering data
Result
Malware family:
Score:
  10/10
Tags:
family:mirai botnet:lzrd linux
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

elf 1ca4d27101849db0b20b2e17b4cb430ca7f895c83df304e54bce4aea025e6667

(this sample)

  
Delivery method
Distributed via web download

Comments