MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 299688062622654720813a8a159a307f9deb4f0aa4ffe74a1ef1545871fd6c51. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 11


Intelligence 11 IOCs YARA 7 File information Comments

SHA256 hash: 299688062622654720813a8a159a307f9deb4f0aa4ffe74a1ef1545871fd6c51
SHA3-384 hash: 151bea19f7e2a5bf35c8e72289a22ce3d021a69f882b3c57fdfbeb431b0cf9b6fe27c2ba1523b2b576c16c95e01719c6
SHA1 hash: a0cdbe51a7331912bf7ab13d65bdac204385f8fd
MD5 hash: 5e8630cd3c1eb1bc09f3a4a275116aea
humanhash: blossom-speaker-sierra-gee
File name:x86_64
Download: download sample
Signature Mirai
File size:43'072 bytes
First seen:2025-08-24 22:44:49 UTC
Last seen:Never
File type: elf
MIME type:application/x-executable
ssdeep 768:dwqr1oZds8NOFjj9llkcuTTPawITwlbOJhoEKmdd:Sqr2ZC8NGhlruTudsVOJdJdd
TLSH T13C131A53A493C0FCC8658370966FF52AD633B42E1239B66937E47E32BE86E311F1A544
telfhash t1ef1131a0796b5899f2cbf122a742e1146c780e7000e139e2e6b175ea2f297800eb4c33
TrID 50.1% (.) ELF Executable and Linkable format (Linux) (4022/12)
49.8% (.O) ELF Executable and Linkable format (generic) (4000/1)
Magika elf
Reporter abuse_ch
Tags:elf mirai

Intelligence


File Origin
# of uploads :
1
# of downloads :
38
Origin country :
DE DE
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:
Verdict:
Malicious
Uses P2P?:
false
Uses anti-vm?:
false
Architecture:
x86
Packer:
not packed
Botnet:
unknown
Number of open files:
7
Number of processes launched:
1
Processes remaning?
false
Remote TCP ports scanned:
not identified
Behaviour
no suspicious findings
Botnet C2s
TCP botnet C2(s):
not identified
UDP botnet C2(s):
not identified
Status:
terminated
Behavior Graph:
%3 guuid=31af6286-1600-0000-f9f1-1cd2a40c0000 pid=3236 /usr/bin/sudo guuid=7644eb87-1600-0000-f9f1-1cd2a90c0000 pid=3241 /tmp/sample.bin guuid=31af6286-1600-0000-f9f1-1cd2a40c0000 pid=3236->guuid=7644eb87-1600-0000-f9f1-1cd2a90c0000 pid=3241 execve guuid=183816b1-1600-0000-f9f1-1cd2f20c0000 pid=3314 /tmp/sample.bin net send-data guuid=7644eb87-1600-0000-f9f1-1cd2a90c0000 pid=3241->guuid=183816b1-1600-0000-f9f1-1cd2f20c0000 pid=3314 clone guuid=fe9b5cb2-1600-0000-f9f1-1cd2f60c0000 pid=3318 /tmp/sample.bin net send-data zombie guuid=7644eb87-1600-0000-f9f1-1cd2a90c0000 pid=3241->guuid=fe9b5cb2-1600-0000-f9f1-1cd2f60c0000 pid=3318 clone d7e75a5d-65d1-5941-aac4-e4015a0a0899 31.56.39.76:6969 guuid=183816b1-1600-0000-f9f1-1cd2f20c0000 pid=3314->d7e75a5d-65d1-5941-aac4-e4015a0a0899 send: 52B 8b0a01dc-0728-52c1-8024-c4ba7801b8d6 8.8.8.8:53 guuid=fe9b5cb2-1600-0000-f9f1-1cd2f60c0000 pid=3318->8b0a01dc-0728-52c1-8024-c4ba7801b8d6 con e9010b07-def5-5d53-bd9f-ed886898ca33 103.136.69.242:1025 guuid=fe9b5cb2-1600-0000-f9f1-1cd2f60c0000 pid=3318->e9010b07-def5-5d53-bd9f-ed886898ca33 send: 12B guuid=55a4deb2-1600-0000-f9f1-1cd2f90c0000 pid=3321 /tmp/sample.bin guuid=fe9b5cb2-1600-0000-f9f1-1cd2f60c0000 pid=3318->guuid=55a4deb2-1600-0000-f9f1-1cd2f90c0000 pid=3321 clone guuid=b4a00c50-1700-0000-f9f1-1cd2160e0000 pid=3606 /tmp/sample.bin net send-data guuid=55a4deb2-1600-0000-f9f1-1cd2f90c0000 pid=3321->guuid=b4a00c50-1700-0000-f9f1-1cd2160e0000 pid=3606 clone guuid=2cd86e54-1700-0000-f9f1-1cd2220e0000 pid=3618 /tmp/sample.bin net send-data guuid=55a4deb2-1600-0000-f9f1-1cd2f90c0000 pid=3321->guuid=2cd86e54-1700-0000-f9f1-1cd2220e0000 pid=3618 clone guuid=2b80a972-1700-0000-f9f1-1cd2700e0000 pid=3696 /tmp/sample.bin net send-data guuid=55a4deb2-1600-0000-f9f1-1cd2f90c0000 pid=3321->guuid=2b80a972-1700-0000-f9f1-1cd2700e0000 pid=3696 clone guuid=74fc5577-1700-0000-f9f1-1cd27d0e0000 pid=3709 /tmp/sample.bin net send-data guuid=55a4deb2-1600-0000-f9f1-1cd2f90c0000 pid=3321->guuid=74fc5577-1700-0000-f9f1-1cd27d0e0000 pid=3709 clone guuid=2744cf7b-1700-0000-f9f1-1cd2890e0000 pid=3721 /tmp/sample.bin net send-data guuid=55a4deb2-1600-0000-f9f1-1cd2f90c0000 pid=3321->guuid=2744cf7b-1700-0000-f9f1-1cd2890e0000 pid=3721 clone guuid=f22ea881-1700-0000-f9f1-1cd2980e0000 pid=3736 /tmp/sample.bin net send-data guuid=55a4deb2-1600-0000-f9f1-1cd2f90c0000 pid=3321->guuid=f22ea881-1700-0000-f9f1-1cd2980e0000 pid=3736 clone guuid=0c8a5487-1700-0000-f9f1-1cd2a50e0000 pid=3749 /tmp/sample.bin net send-data guuid=55a4deb2-1600-0000-f9f1-1cd2f90c0000 pid=3321->guuid=0c8a5487-1700-0000-f9f1-1cd2a50e0000 pid=3749 clone guuid=56e0c58b-1700-0000-f9f1-1cd2b00e0000 pid=3760 /tmp/sample.bin net send-data guuid=55a4deb2-1600-0000-f9f1-1cd2f90c0000 pid=3321->guuid=56e0c58b-1700-0000-f9f1-1cd2b00e0000 pid=3760 clone guuid=88a27a91-1700-0000-f9f1-1cd2bc0e0000 pid=3772 /tmp/sample.bin net send-data guuid=55a4deb2-1600-0000-f9f1-1cd2f90c0000 pid=3321->guuid=88a27a91-1700-0000-f9f1-1cd2bc0e0000 pid=3772 clone guuid=abbcf296-1700-0000-f9f1-1cd2c90e0000 pid=3785 /tmp/sample.bin net send-data guuid=55a4deb2-1600-0000-f9f1-1cd2f90c0000 pid=3321->guuid=abbcf296-1700-0000-f9f1-1cd2c90e0000 pid=3785 clone guuid=1908f19b-1700-0000-f9f1-1cd2d40e0000 pid=3796 /tmp/sample.bin net send-data guuid=55a4deb2-1600-0000-f9f1-1cd2f90c0000 pid=3321->guuid=1908f19b-1700-0000-f9f1-1cd2d40e0000 pid=3796 clone guuid=845f78a0-1700-0000-f9f1-1cd2df0e0000 pid=3807 /tmp/sample.bin net send-data guuid=55a4deb2-1600-0000-f9f1-1cd2f90c0000 pid=3321->guuid=845f78a0-1700-0000-f9f1-1cd2df0e0000 pid=3807 clone guuid=bd9323a5-1700-0000-f9f1-1cd2ea0e0000 pid=3818 /tmp/sample.bin net send-data guuid=55a4deb2-1600-0000-f9f1-1cd2f90c0000 pid=3321->guuid=bd9323a5-1700-0000-f9f1-1cd2ea0e0000 pid=3818 clone guuid=7129cca9-1700-0000-f9f1-1cd2f50e0000 pid=3829 /tmp/sample.bin net send-data guuid=55a4deb2-1600-0000-f9f1-1cd2f90c0000 pid=3321->guuid=7129cca9-1700-0000-f9f1-1cd2f50e0000 pid=3829 clone guuid=b19df1ae-1700-0000-f9f1-1cd2000f0000 pid=3840 /tmp/sample.bin net send-data guuid=55a4deb2-1600-0000-f9f1-1cd2f90c0000 pid=3321->guuid=b19df1ae-1700-0000-f9f1-1cd2000f0000 pid=3840 clone guuid=430f0bc0-1700-0000-f9f1-1cd2240f0000 pid=3876 /tmp/sample.bin net send-data guuid=55a4deb2-1600-0000-f9f1-1cd2f90c0000 pid=3321->guuid=430f0bc0-1700-0000-f9f1-1cd2240f0000 pid=3876 clone guuid=bfd16dcd-1700-0000-f9f1-1cd2420f0000 pid=3906 /tmp/sample.bin net send-data guuid=55a4deb2-1600-0000-f9f1-1cd2f90c0000 pid=3321->guuid=bfd16dcd-1700-0000-f9f1-1cd2420f0000 pid=3906 clone guuid=e1e634d0-1700-0000-f9f1-1cd24e0f0000 pid=3918 /tmp/sample.bin net send-data guuid=55a4deb2-1600-0000-f9f1-1cd2f90c0000 pid=3321->guuid=e1e634d0-1700-0000-f9f1-1cd24e0f0000 pid=3918 clone guuid=db65c9d2-1700-0000-f9f1-1cd25a0f0000 pid=3930 /tmp/sample.bin net send-data guuid=55a4deb2-1600-0000-f9f1-1cd2f90c0000 pid=3321->guuid=db65c9d2-1700-0000-f9f1-1cd25a0f0000 pid=3930 clone guuid=71da52d6-1700-0000-f9f1-1cd2680f0000 pid=3944 /tmp/sample.bin net send-data guuid=55a4deb2-1600-0000-f9f1-1cd2f90c0000 pid=3321->guuid=71da52d6-1700-0000-f9f1-1cd2680f0000 pid=3944 clone guuid=34bebad6-1700-0000-f9f1-1cd26a0f0000 pid=3946 /tmp/sample.bin net send-data guuid=55a4deb2-1600-0000-f9f1-1cd2f90c0000 pid=3321->guuid=34bebad6-1700-0000-f9f1-1cd26a0f0000 pid=3946 clone guuid=3413b03d-1800-0000-f9f1-1cd243100000 pid=4163 /tmp/sample.bin net send-data guuid=55a4deb2-1600-0000-f9f1-1cd2f90c0000 pid=3321->guuid=3413b03d-1800-0000-f9f1-1cd243100000 pid=4163 clone guuid=6ffee890-1800-0000-f9f1-1cd2c9100000 pid=4297 /tmp/sample.bin net send-data guuid=55a4deb2-1600-0000-f9f1-1cd2f90c0000 pid=3321->guuid=6ffee890-1800-0000-f9f1-1cd2c9100000 pid=4297 clone guuid=72a1bd7f-2400-0000-f9f1-1cd200110000 pid=4352 /tmp/sample.bin net send-data guuid=55a4deb2-1600-0000-f9f1-1cd2f90c0000 pid=3321->guuid=72a1bd7f-2400-0000-f9f1-1cd200110000 pid=4352 clone guuid=b4a00c50-1700-0000-f9f1-1cd2160e0000 pid=3606->d7e75a5d-65d1-5941-aac4-e4015a0a0899 send: 78B guuid=2cd86e54-1700-0000-f9f1-1cd2220e0000 pid=3618->d7e75a5d-65d1-5941-aac4-e4015a0a0899 send: 78B guuid=2b80a972-1700-0000-f9f1-1cd2700e0000 pid=3696->d7e75a5d-65d1-5941-aac4-e4015a0a0899 send: 46B guuid=74fc5577-1700-0000-f9f1-1cd27d0e0000 pid=3709->d7e75a5d-65d1-5941-aac4-e4015a0a0899 send: 78B guuid=2744cf7b-1700-0000-f9f1-1cd2890e0000 pid=3721->d7e75a5d-65d1-5941-aac4-e4015a0a0899 send: 78B guuid=f22ea881-1700-0000-f9f1-1cd2980e0000 pid=3736->d7e75a5d-65d1-5941-aac4-e4015a0a0899 send: 78B guuid=0c8a5487-1700-0000-f9f1-1cd2a50e0000 pid=3749->d7e75a5d-65d1-5941-aac4-e4015a0a0899 send: 78B guuid=56e0c58b-1700-0000-f9f1-1cd2b00e0000 pid=3760->d7e75a5d-65d1-5941-aac4-e4015a0a0899 send: 78B guuid=88a27a91-1700-0000-f9f1-1cd2bc0e0000 pid=3772->d7e75a5d-65d1-5941-aac4-e4015a0a0899 send: 78B guuid=abbcf296-1700-0000-f9f1-1cd2c90e0000 pid=3785->d7e75a5d-65d1-5941-aac4-e4015a0a0899 send: 78B guuid=1908f19b-1700-0000-f9f1-1cd2d40e0000 pid=3796->d7e75a5d-65d1-5941-aac4-e4015a0a0899 send: 78B guuid=845f78a0-1700-0000-f9f1-1cd2df0e0000 pid=3807->d7e75a5d-65d1-5941-aac4-e4015a0a0899 send: 78B guuid=bd9323a5-1700-0000-f9f1-1cd2ea0e0000 pid=3818->d7e75a5d-65d1-5941-aac4-e4015a0a0899 send: 78B guuid=7129cca9-1700-0000-f9f1-1cd2f50e0000 pid=3829->d7e75a5d-65d1-5941-aac4-e4015a0a0899 send: 78B guuid=b19df1ae-1700-0000-f9f1-1cd2000f0000 pid=3840->d7e75a5d-65d1-5941-aac4-e4015a0a0899 send: 38B guuid=430f0bc0-1700-0000-f9f1-1cd2240f0000 pid=3876->d7e75a5d-65d1-5941-aac4-e4015a0a0899 send: 78B guuid=bfd16dcd-1700-0000-f9f1-1cd2420f0000 pid=3906->d7e75a5d-65d1-5941-aac4-e4015a0a0899 send: 78B guuid=e1e634d0-1700-0000-f9f1-1cd24e0f0000 pid=3918->d7e75a5d-65d1-5941-aac4-e4015a0a0899 send: 78B guuid=db65c9d2-1700-0000-f9f1-1cd25a0f0000 pid=3930->d7e75a5d-65d1-5941-aac4-e4015a0a0899 send: 78B guuid=71da52d6-1700-0000-f9f1-1cd2680f0000 pid=3944->d7e75a5d-65d1-5941-aac4-e4015a0a0899 send: 78B guuid=34bebad6-1700-0000-f9f1-1cd26a0f0000 pid=3946->d7e75a5d-65d1-5941-aac4-e4015a0a0899 send: 37B guuid=3413b03d-1800-0000-f9f1-1cd243100000 pid=4163->d7e75a5d-65d1-5941-aac4-e4015a0a0899 send: 78B guuid=6ffee890-1800-0000-f9f1-1cd2c9100000 pid=4297->d7e75a5d-65d1-5941-aac4-e4015a0a0899 send: 39B guuid=72a1bd7f-2400-0000-f9f1-1cd200110000 pid=4352->d7e75a5d-65d1-5941-aac4-e4015a0a0899 send: 35B
Result
Threat name:
n/a
Detection:
malicious
Classification:
spre.troj
Score:
64 / 100
Signature
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Sample reads /proc/mounts (often used for finding a writable filesystem)
Sample tries to kill multiple processes (SIGKILL)
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1764162 Sample: x86_64.elf Startdate: 25/08/2025 Architecture: LINUX Score: 64 27 31.56.39.76, 42290, 42294, 42296 RASANAIR Iran (ISLAMIC Republic Of) 2->27 29 51.83.147.130, 1025, 39018 OVHFR France 2->29 31 3 other IPs or domains 2->31 35 Malicious sample detected (through community Yara rule) 2->35 37 Multi AV Scanner detection for submitted file 2->37 9 x86_64.elf 2->9         started        signatures3 process4 signatures5 39 Sample tries to kill multiple processes (SIGKILL) 9->39 41 Sample reads /proc/mounts (often used for finding a writable filesystem) 9->41 12 x86_64.elf 9->12         started        14 x86_64.elf 9->14         started        process6 process7 16 x86_64.elf 12->16         started        signatures8 33 Sample tries to kill multiple processes (SIGKILL) 16->33 19 x86_64.elf 16->19         started        21 x86_64.elf 16->21         started        23 x86_64.elf 16->23         started        25 5 other processes 16->25 process9
Threat name:
Linux.Worm.Mirai
Status:
Malicious
First seen:
2025-08-24 22:46:00 UTC
File Type:
ELF64 Little (Exe)
AV detection:
16 of 24 (66.67%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  6/10
Tags:
credential_access discovery linux
Behaviour
Reads runtime system information
Changes its process name
Reads process memory
Enumerates running processes
Verdict:
Malicious
Tags:
Unix.Trojan.Mirai-9970440-0 trojan mirai gafgyt
YARA:
Linux_Trojan_Gafgyt_9e9530a7 Linux_Trojan_Gafgyt_807911a2 Linux_Trojan_Gafgyt_d4227dbf Linux_Trojan_Gafgyt_620087b9 Linux_Trojan_Gafgyt_33b4111a Linux_Trojan_Mirai_1cb033f3
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:CP_AllMal_Detector
Author:DiegoAnalytics
Description:CrossPlatform All Malwares Detector: Detect PE, ELF, Mach-O, scripts, archives; overlay, obfuscation, encryption, spoofing, hiding, high entropy, network communication
Rule name:Linux_Trojan_Gafgyt_33b4111a
Author:Elastic Security
Rule name:Linux_Trojan_Gafgyt_620087b9
Author:Elastic Security
Rule name:Linux_Trojan_Gafgyt_807911a2
Author:Elastic Security
Rule name:Linux_Trojan_Gafgyt_9e9530a7
Author:Elastic Security
Rule name:Linux_Trojan_Gafgyt_d4227dbf
Author:Elastic Security
Rule name:Linux_Trojan_Mirai_1cb033f3
Author:Elastic Security

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

elf 299688062622654720813a8a159a307f9deb4f0aa4ffe74a1ef1545871fd6c51

(this sample)

  
Delivery method
Distributed via web download

Comments