MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 2824d9756a53bd4d52f89f3e6795be26bdb677f91f53a43af044722ee88fbec4. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments 1

SHA256 hash: 2824d9756a53bd4d52f89f3e6795be26bdb677f91f53a43af044722ee88fbec4
SHA3-384 hash: 466ba5b4a0a45c86c961a81a10e6443cde7bac7d6a3e02cbfcb64d658fad27551f8c54c115e9884791eea850d41061d6
SHA1 hash: 06b7b5d7739ff26f3bd26ef4df6cc6ec34eacae1
MD5 hash: 252be19ec17098756e86c685785eb00a
humanhash: jersey-idaho-grey-william
File name:252be19ec17098756e86c685785eb00a
Download: download sample
Signature Mirai
File size:27'244 bytes
First seen:2022-05-04 22:46:57 UTC
Last seen:Never
File type: elf
MIME type:application/x-executable
ssdeep 768:MuCUFskb2JgIs/E2+OocrfJiHNjfmQ2q7IoqdBksWQ:5CrJgHiOJrfwmQrctD
TLSH T1ADC2D0DFB48A79C5CC1C5CBC259D9AE115ADA2C2234B9F0837103DCCA97655FB89C8B8
TrID 50.1% (.) ELF Executable and Linkable format (Linux) (4022/12)
49.8% (.O) ELF Executable and Linkable format (generic) (4000/1)
Reporter zbetcheckin
Tags:32 elf mips mirai

Intelligence


File Origin
# of uploads :
1
# of downloads :
203
Origin country :
n/a
Vendor Threat Intelligence
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
anti-debug
Verdict:
Malicious
Uses P2P?:
false
Uses anti-vm?:
false
Architecture:
mips
Packer:
UPX
Botnet:
unknown
Number of open files:
7
Number of processes launched:
1
Processes remaning?
false
Remote TCP ports scanned:
not identified
Behaviour
no suspicious findings
Botnet C2s
TCP botnet C2(s):
not identified
UDP botnet C2(s):
not identified
Result
Verdict:
MALICIOUS
Result
Threat name:
Detection:
malicious
Classification:
troj.evad
Score:
60 / 100
Signature
Multi AV Scanner detection for submitted file
Sample is packed with UPX
Yara detected Mirai
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 620608 Sample: JyvDqLVH73 Startdate: 05/05/2022 Architecture: LINUX Score: 60 68 105.170.242.16 unitel-ASAO Angola 2->68 70 119.26.236.147 ZAQJupiterTelecommunicationsCoLtdJP Japan 2->70 72 98 other IPs or domains 2->72 74 Multi AV Scanner detection for submitted file 2->74 76 Yara detected Mirai 2->76 78 Sample is packed with UPX 2->78 10 systemd logrotate 2->10         started        12 systemd mandb JyvDqLVH73 2->12         started        14 systemd install 2->14         started        16 systemd find 2->16         started        signatures3 process4 process5 18 logrotate sh 10->18         started        20 logrotate sh 10->20         started        22 logrotate gzip 10->22         started        24 logrotate gzip 10->24         started        26 JyvDqLVH73 12->26         started        28 JyvDqLVH73 12->28         started        30 JyvDqLVH73 12->30         started        process6 32 sh invoke-rc.d 18->32         started        34 sh rsyslog-rotate 20->34         started        36 JyvDqLVH73 26->36         started        38 JyvDqLVH73 26->38         started        40 JyvDqLVH73 28->40         started        42 JyvDqLVH73 28->42         started        44 JyvDqLVH73 28->44         started        process7 46 invoke-rc.d runlevel 32->46         started        48 invoke-rc.d systemctl 32->48         started        50 invoke-rc.d ls 32->50         started        52 invoke-rc.d systemctl 32->52         started        54 rsyslog-rotate systemctl 34->54         started        56 JyvDqLVH73 36->56         started        62 2 other processes 36->62 58 JyvDqLVH73 40->58         started        60 JyvDqLVH73 40->60         started        process8 64 JyvDqLVH73 56->64         started        66 JyvDqLVH73 56->66         started       
Threat name:
Linux.Trojan.Mirai
Status:
Malicious
First seen:
2022-05-04 22:47:05 UTC
File Type:
ELF32 Little (Exe)
AV detection:
18 of 26 (69.23%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  1/10
Tags:
linux
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

elf 2824d9756a53bd4d52f89f3e6795be26bdb677f91f53a43af044722ee88fbec4

(this sample)

  
Delivery method
Distributed via web download

Comments



Avatar
zbet commented on 2022-05-04 22:46:59 UTC

url : hxxp://45.95.169.124/bins/sora.mpsl