MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 29ded76647c1db3bf5b092b92985eb9bc36eeb843bd8af4cb7f5a90b91ecb81c. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 7


Intelligence 7 IOCs YARA 8 File information Comments

SHA256 hash: 29ded76647c1db3bf5b092b92985eb9bc36eeb843bd8af4cb7f5a90b91ecb81c
SHA3-384 hash: 778c449648b082de489546a515b64823f3b75e92043040908a20c6fe2ab22b2bb5546e49a2b461feca191f2cdc8c4191
SHA1 hash: f33e784b4fe2201e2420c8ca185d3ad63c7ff57c
MD5 hash: 55590a03b789bced06f90a2576169dba
humanhash: cardinal-potato-seven-echo
File name:x86_32.uhavenobotsxd
Download: download sample
Signature Mirai
File size:91'124 bytes
First seen:2025-12-24 12:24:38 UTC
Last seen:Never
File type: elf
MIME type:application/x-executable
ssdeep 1536:Mwvj4L+US1nDAehMR2N8xzHvcwV4XTVWJ2Wd++aJdAS4315hTSk7MmEMcV:T77z1nDASMR2GhHUwV4XTVWU6aJWhrJC
TLSH T11A935CC6B743C8F5ED6621B8213BA3375676E5390129DB8ACB24BC359C16601F71B3AC
telfhash t1cd4125f60aaf5cd8a7d4a841d09f6f303c1ea777216032a346b3d434226be4614bad3d
TrID 50.1% (.) ELF Executable and Linkable format (Linux) (4022/12)
49.8% (.O) ELF Executable and Linkable format (generic) (4000/1)
Magika elf
Reporter abuse_ch
Tags:elf mirai

Intelligence


File Origin
# of uploads :
1
# of downloads :
32
Origin country :
DE DE
Vendor Threat Intelligence
No detections
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
mirai
Result
Gathering data
Status:
terminated
Behavior Graph:
%3 guuid=109dc8c3-1a00-0000-1cd9-85fa3f0b0000 pid=2879 /usr/bin/sudo guuid=c1d541c6-1a00-0000-1cd9-85fa470b0000 pid=2887 /tmp/sample.bin net write-file guuid=109dc8c3-1a00-0000-1cd9-85fa3f0b0000 pid=2879->guuid=c1d541c6-1a00-0000-1cd9-85fa470b0000 pid=2887 execve 8b0a01dc-0728-52c1-8024-c4ba7801b8d6 8.8.8.8:53 guuid=c1d541c6-1a00-0000-1cd9-85fa470b0000 pid=2887->8b0a01dc-0728-52c1-8024-c4ba7801b8d6 con guuid=8b4166cd-1a00-0000-1cd9-85fa570b0000 pid=2903 /tmp/sample.bin delete-file net write-config write-file zombie guuid=c1d541c6-1a00-0000-1cd9-85fa470b0000 pid=2887->guuid=8b4166cd-1a00-0000-1cd9-85fa570b0000 pid=2903 clone b9d7c26d-3cdf-5c73-b2c4-86a159783a06 94.154.35.153:6969 guuid=8b4166cd-1a00-0000-1cd9-85fa570b0000 pid=2903->b9d7c26d-3cdf-5c73-b2c4-86a159783a06 con guuid=f8547ccd-1a00-0000-1cd9-85fa580b0000 pid=2904 /usr/bin/dash guuid=8b4166cd-1a00-0000-1cd9-85fa570b0000 pid=2903->guuid=f8547ccd-1a00-0000-1cd9-85fa580b0000 pid=2904 execve guuid=bd6d1cce-1a00-0000-1cd9-85fa5b0b0000 pid=2907 /usr/bin/dash guuid=8b4166cd-1a00-0000-1cd9-85fa570b0000 pid=2903->guuid=bd6d1cce-1a00-0000-1cd9-85fa5b0b0000 pid=2907 execve guuid=7f75ddce-1a00-0000-1cd9-85fa600b0000 pid=2912 /usr/bin/dash guuid=8b4166cd-1a00-0000-1cd9-85fa570b0000 pid=2903->guuid=7f75ddce-1a00-0000-1cd9-85fa600b0000 pid=2912 execve guuid=df1fb0cf-1a00-0000-1cd9-85fa630b0000 pid=2915 /usr/bin/dash guuid=8b4166cd-1a00-0000-1cd9-85fa570b0000 pid=2903->guuid=df1fb0cf-1a00-0000-1cd9-85fa630b0000 pid=2915 execve guuid=5ef847d0-1a00-0000-1cd9-85fa670b0000 pid=2919 /usr/bin/dash guuid=8b4166cd-1a00-0000-1cd9-85fa570b0000 pid=2903->guuid=5ef847d0-1a00-0000-1cd9-85fa670b0000 pid=2919 execve guuid=f406e5d0-1a00-0000-1cd9-85fa6b0b0000 pid=2923 /usr/bin/dash guuid=8b4166cd-1a00-0000-1cd9-85fa570b0000 pid=2903->guuid=f406e5d0-1a00-0000-1cd9-85fa6b0b0000 pid=2923 execve guuid=b30b95d1-1a00-0000-1cd9-85fa700b0000 pid=2928 /usr/bin/dash guuid=8b4166cd-1a00-0000-1cd9-85fa570b0000 pid=2903->guuid=b30b95d1-1a00-0000-1cd9-85fa700b0000 pid=2928 execve guuid=c09a3fd2-1a00-0000-1cd9-85fa740b0000 pid=2932 /usr/bin/dash guuid=8b4166cd-1a00-0000-1cd9-85fa570b0000 pid=2903->guuid=c09a3fd2-1a00-0000-1cd9-85fa740b0000 pid=2932 execve guuid=46bac8d2-1a00-0000-1cd9-85fa770b0000 pid=2935 /usr/bin/dash guuid=8b4166cd-1a00-0000-1cd9-85fa570b0000 pid=2903->guuid=46bac8d2-1a00-0000-1cd9-85fa770b0000 pid=2935 execve guuid=ecf2d1d3-1a00-0000-1cd9-85fa790b0000 pid=2937 /usr/bin/dash guuid=8b4166cd-1a00-0000-1cd9-85fa570b0000 pid=2903->guuid=ecf2d1d3-1a00-0000-1cd9-85fa790b0000 pid=2937 execve guuid=45f16bd5-1a00-0000-1cd9-85fa7f0b0000 pid=2943 /usr/bin/dash guuid=8b4166cd-1a00-0000-1cd9-85fa570b0000 pid=2903->guuid=45f16bd5-1a00-0000-1cd9-85fa7f0b0000 pid=2943 execve guuid=ac99ecdd-1a00-0000-1cd9-85fa8b0b0000 pid=2955 /usr/bin/dash guuid=8b4166cd-1a00-0000-1cd9-85fa570b0000 pid=2903->guuid=ac99ecdd-1a00-0000-1cd9-85fa8b0b0000 pid=2955 execve guuid=81b10fe8-1a00-0000-1cd9-85fa8d0b0000 pid=2957 /usr/bin/dash guuid=8b4166cd-1a00-0000-1cd9-85fa570b0000 pid=2903->guuid=81b10fe8-1a00-0000-1cd9-85fa8d0b0000 pid=2957 execve guuid=31b79bea-1a00-0000-1cd9-85fa900b0000 pid=2960 /usr/bin/dash guuid=8b4166cd-1a00-0000-1cd9-85fa570b0000 pid=2903->guuid=31b79bea-1a00-0000-1cd9-85fa900b0000 pid=2960 execve guuid=09c824eb-1a00-0000-1cd9-85fa920b0000 pid=2962 /usr/bin/dash guuid=8b4166cd-1a00-0000-1cd9-85fa570b0000 pid=2903->guuid=09c824eb-1a00-0000-1cd9-85fa920b0000 pid=2962 execve guuid=179f26ec-1a00-0000-1cd9-85fa970b0000 pid=2967 /usr/bin/dash guuid=8b4166cd-1a00-0000-1cd9-85fa570b0000 pid=2903->guuid=179f26ec-1a00-0000-1cd9-85fa970b0000 pid=2967 execve guuid=c06364ec-1a00-0000-1cd9-85fa9a0b0000 pid=2970 /usr/bin/dash guuid=8b4166cd-1a00-0000-1cd9-85fa570b0000 pid=2903->guuid=c06364ec-1a00-0000-1cd9-85fa9a0b0000 pid=2970 execve guuid=1f8acaed-1a00-0000-1cd9-85faa40b0000 pid=2980 /usr/bin/dash guuid=8b4166cd-1a00-0000-1cd9-85fa570b0000 pid=2903->guuid=1f8acaed-1a00-0000-1cd9-85faa40b0000 pid=2980 execve guuid=090e55ee-1a00-0000-1cd9-85faa70b0000 pid=2983 /usr/bin/dash guuid=8b4166cd-1a00-0000-1cd9-85fa570b0000 pid=2903->guuid=090e55ee-1a00-0000-1cd9-85faa70b0000 pid=2983 execve guuid=43755fef-1a00-0000-1cd9-85faae0b0000 pid=2990 /usr/bin/dash guuid=8b4166cd-1a00-0000-1cd9-85fa570b0000 pid=2903->guuid=43755fef-1a00-0000-1cd9-85faae0b0000 pid=2990 execve guuid=6ec571f1-1a00-0000-1cd9-85fab60b0000 pid=2998 /usr/bin/dash guuid=8b4166cd-1a00-0000-1cd9-85fa570b0000 pid=2903->guuid=6ec571f1-1a00-0000-1cd9-85fab60b0000 pid=2998 execve guuid=cb4b1df3-1a00-0000-1cd9-85fab90b0000 pid=3001 /usr/bin/dash guuid=8b4166cd-1a00-0000-1cd9-85fa570b0000 pid=2903->guuid=cb4b1df3-1a00-0000-1cd9-85fab90b0000 pid=3001 execve guuid=47bd1ef4-1a00-0000-1cd9-85fabc0b0000 pid=3004 /tmp/sample.bin guuid=8b4166cd-1a00-0000-1cd9-85fa570b0000 pid=2903->guuid=47bd1ef4-1a00-0000-1cd9-85fabc0b0000 pid=3004 clone guuid=c0b226f4-1a00-0000-1cd9-85fabd0b0000 pid=3005 /tmp/sample.bin guuid=8b4166cd-1a00-0000-1cd9-85fa570b0000 pid=2903->guuid=c0b226f4-1a00-0000-1cd9-85fabd0b0000 pid=3005 clone guuid=95cba4cd-1a00-0000-1cd9-85fa5a0b0000 pid=2906 /usr/bin/rm guuid=f8547ccd-1a00-0000-1cd9-85fa580b0000 pid=2904->guuid=95cba4cd-1a00-0000-1cd9-85fa5a0b0000 pid=2906 execve guuid=cc6661ce-1a00-0000-1cd9-85fa5d0b0000 pid=2909 /usr/bin/rm guuid=bd6d1cce-1a00-0000-1cd9-85fa5b0b0000 pid=2907->guuid=cc6661ce-1a00-0000-1cd9-85fa5d0b0000 pid=2909 execve guuid=cb5b3acf-1a00-0000-1cd9-85fa620b0000 pid=2914 /usr/bin/rm guuid=7f75ddce-1a00-0000-1cd9-85fa600b0000 pid=2912->guuid=cb5b3acf-1a00-0000-1cd9-85fa620b0000 pid=2914 execve guuid=e866edcf-1a00-0000-1cd9-85fa650b0000 pid=2917 /usr/bin/rm guuid=df1fb0cf-1a00-0000-1cd9-85fa630b0000 pid=2915->guuid=e866edcf-1a00-0000-1cd9-85fa650b0000 pid=2917 execve guuid=b29082d0-1a00-0000-1cd9-85fa690b0000 pid=2921 /usr/bin/rm guuid=5ef847d0-1a00-0000-1cd9-85fa670b0000 pid=2919->guuid=b29082d0-1a00-0000-1cd9-85fa690b0000 pid=2921 execve guuid=2b444dd1-1a00-0000-1cd9-85fa6e0b0000 pid=2926 /usr/bin/rm guuid=f406e5d0-1a00-0000-1cd9-85fa6b0b0000 pid=2923->guuid=2b444dd1-1a00-0000-1cd9-85fa6e0b0000 pid=2926 execve guuid=cbacc3d1-1a00-0000-1cd9-85fa710b0000 pid=2929 /usr/bin/rm guuid=b30b95d1-1a00-0000-1cd9-85fa700b0000 pid=2928->guuid=cbacc3d1-1a00-0000-1cd9-85fa710b0000 pid=2929 execve guuid=6fd06ed2-1a00-0000-1cd9-85fa760b0000 pid=2934 /usr/bin/rm guuid=c09a3fd2-1a00-0000-1cd9-85fa740b0000 pid=2932->guuid=6fd06ed2-1a00-0000-1cd9-85fa760b0000 pid=2934 execve guuid=8e7917d3-1a00-0000-1cd9-85fa780b0000 pid=2936 /usr/bin/rm guuid=46bac8d2-1a00-0000-1cd9-85fa770b0000 pid=2935->guuid=8e7917d3-1a00-0000-1cd9-85fa780b0000 pid=2936 execve guuid=22dd0ed4-1a00-0000-1cd9-85fa7b0b0000 pid=2939 /usr/bin/killall guuid=ecf2d1d3-1a00-0000-1cd9-85fa790b0000 pid=2937->guuid=22dd0ed4-1a00-0000-1cd9-85fa7b0b0000 pid=2939 execve guuid=b44d9bd5-1a00-0000-1cd9-85fa800b0000 pid=2944 /usr/bin/killall guuid=45f16bd5-1a00-0000-1cd9-85fa7f0b0000 pid=2943->guuid=b44d9bd5-1a00-0000-1cd9-85fa800b0000 pid=2944 execve guuid=196b36de-1a00-0000-1cd9-85fa8c0b0000 pid=2956 /usr/bin/cp guuid=ac99ecdd-1a00-0000-1cd9-85fa8b0b0000 pid=2955->guuid=196b36de-1a00-0000-1cd9-85fa8c0b0000 pid=2956 execve guuid=bddb77e8-1a00-0000-1cd9-85fa8e0b0000 pid=2958 /usr/bin/cp write-file guuid=81b10fe8-1a00-0000-1cd9-85fa8d0b0000 pid=2957->guuid=bddb77e8-1a00-0000-1cd9-85fa8e0b0000 pid=2958 execve guuid=55a50deb-1a00-0000-1cd9-85fa910b0000 pid=2961 /etc/init.d/S99backup0 zombie guuid=31b79bea-1a00-0000-1cd9-85fa900b0000 pid=2960->guuid=55a50deb-1a00-0000-1cd9-85fa910b0000 pid=2961 execve guuid=0a6658eb-1a00-0000-1cd9-85fa930b0000 pid=2963 /usr/bin/dash guuid=55a50deb-1a00-0000-1cd9-85fa910b0000 pid=2961->guuid=0a6658eb-1a00-0000-1cd9-85fa930b0000 pid=2963 clone guuid=d34d75eb-1a00-0000-1cd9-85fa950b0000 pid=2965 /usr/bin/cp guuid=09c824eb-1a00-0000-1cd9-85fa920b0000 pid=2962->guuid=d34d75eb-1a00-0000-1cd9-85fa950b0000 pid=2965 execve guuid=a94371eb-1a00-0000-1cd9-85fa940b0000 pid=2964 /boot/efi/.update write-file guuid=0a6658eb-1a00-0000-1cd9-85fa930b0000 pid=2963->guuid=a94371eb-1a00-0000-1cd9-85fa940b0000 pid=2964 execve guuid=70a076eb-1a00-0000-1cd9-85fa960b0000 pid=2966 /usr/bin/sleep guuid=0a6658eb-1a00-0000-1cd9-85fa930b0000 pid=2963->guuid=70a076eb-1a00-0000-1cd9-85fa960b0000 pid=2966 execve guuid=620859ec-1a00-0000-1cd9-85fa990b0000 pid=2969 /etc/init.d/S99backup1 zombie guuid=179f26ec-1a00-0000-1cd9-85fa970b0000 pid=2967->guuid=620859ec-1a00-0000-1cd9-85fa990b0000 pid=2969 execve guuid=54c095ec-1a00-0000-1cd9-85fa9c0b0000 pid=2972 /usr/bin/dash guuid=620859ec-1a00-0000-1cd9-85fa990b0000 pid=2969->guuid=54c095ec-1a00-0000-1cd9-85fa9c0b0000 pid=2972 clone guuid=1858d1ec-1a00-0000-1cd9-85fa9e0b0000 pid=2974 /usr/bin/cp guuid=c06364ec-1a00-0000-1cd9-85fa9a0b0000 pid=2970->guuid=1858d1ec-1a00-0000-1cd9-85fa9e0b0000 pid=2974 execve guuid=031bd6ec-1a00-0000-1cd9-85fa9f0b0000 pid=2975 /var/log/.update write-file guuid=54c095ec-1a00-0000-1cd9-85fa9c0b0000 pid=2972->guuid=031bd6ec-1a00-0000-1cd9-85fa9f0b0000 pid=2975 execve guuid=d49fd9ec-1a00-0000-1cd9-85faa00b0000 pid=2976 /usr/bin/sleep guuid=54c095ec-1a00-0000-1cd9-85fa9c0b0000 pid=2972->guuid=d49fd9ec-1a00-0000-1cd9-85faa00b0000 pid=2976 execve guuid=fb27f6ed-1a00-0000-1cd9-85faa50b0000 pid=2981 /etc/init.d/S99backup2 zombie guuid=1f8acaed-1a00-0000-1cd9-85faa40b0000 pid=2980->guuid=fb27f6ed-1a00-0000-1cd9-85faa50b0000 pid=2981 execve guuid=af2f6aee-1a00-0000-1cd9-85faa80b0000 pid=2984 /usr/bin/dash guuid=fb27f6ed-1a00-0000-1cd9-85faa50b0000 pid=2981->guuid=af2f6aee-1a00-0000-1cd9-85faa80b0000 pid=2984 clone guuid=0daaa9ee-1a00-0000-1cd9-85faab0b0000 pid=2987 /usr/bin/dash guuid=090e55ee-1a00-0000-1cd9-85faa70b0000 pid=2983->guuid=0daaa9ee-1a00-0000-1cd9-85faab0b0000 pid=2987 clone guuid=555eb6ee-1a00-0000-1cd9-85faac0b0000 pid=2988 /usr/bin/dash guuid=090e55ee-1a00-0000-1cd9-85faa70b0000 pid=2983->guuid=555eb6ee-1a00-0000-1cd9-85faac0b0000 pid=2988 clone guuid=088f9cee-1a00-0000-1cd9-85faa90b0000 pid=2985 /var/.update write-file guuid=af2f6aee-1a00-0000-1cd9-85faa80b0000 pid=2984->guuid=088f9cee-1a00-0000-1cd9-85faa90b0000 pid=2985 execve guuid=92279fee-1a00-0000-1cd9-85faaa0b0000 pid=2986 /usr/bin/sleep guuid=af2f6aee-1a00-0000-1cd9-85faa80b0000 pid=2984->guuid=92279fee-1a00-0000-1cd9-85faaa0b0000 pid=2986 execve guuid=8c3093f2-1a00-0000-1cd9-85fab80b0000 pid=3000 /etc/init.d/S99network zombie guuid=6ec571f1-1a00-0000-1cd9-85fab60b0000 pid=2998->guuid=8c3093f2-1a00-0000-1cd9-85fab80b0000 pid=3000 execve guuid=ad84e7f3-1a00-0000-1cd9-85faba0b0000 pid=3002 /usr/bin/dash guuid=8c3093f2-1a00-0000-1cd9-85fab80b0000 pid=3000->guuid=ad84e7f3-1a00-0000-1cd9-85faba0b0000 pid=3002 clone guuid=001812f4-1a00-0000-1cd9-85fabb0b0000 pid=3003 /boot/efi/.monitor zombie guuid=cb4b1df3-1a00-0000-1cd9-85fab90b0000 pid=3001->guuid=001812f4-1a00-0000-1cd9-85fabb0b0000 pid=3003 execve guuid=f36c3df4-1a00-0000-1cd9-85fabe0b0000 pid=3006 /usr/bin/.update guuid=ad84e7f3-1a00-0000-1cd9-85faba0b0000 pid=3002->guuid=f36c3df4-1a00-0000-1cd9-85fabe0b0000 pid=3006 execve guuid=776775f4-1a00-0000-1cd9-85fabf0b0000 pid=3007 /usr/bin/sleep guuid=ad84e7f3-1a00-0000-1cd9-85faba0b0000 pid=3002->guuid=776775f4-1a00-0000-1cd9-85fabf0b0000 pid=3007 execve guuid=8cda27f5-1a00-0000-1cd9-85fac20b0000 pid=3010 /usr/bin/dash guuid=001812f4-1a00-0000-1cd9-85fabb0b0000 pid=3003->guuid=8cda27f5-1a00-0000-1cd9-85fac20b0000 pid=3010 clone guuid=27b139f5-1a00-0000-1cd9-85fac30b0000 pid=3011 /usr/bin/.update write-file guuid=8cda27f5-1a00-0000-1cd9-85fac20b0000 pid=3010->guuid=27b139f5-1a00-0000-1cd9-85fac30b0000 pid=3011 execve guuid=5cc43ef5-1a00-0000-1cd9-85fac40b0000 pid=3012 /usr/bin/sleep guuid=8cda27f5-1a00-0000-1cd9-85fac20b0000 pid=3010->guuid=5cc43ef5-1a00-0000-1cd9-85fac40b0000 pid=3012 execve
Result
Threat name:
n/a
Detection:
malicious
Classification:
spre.troj.evad
Score:
100 / 100
Signature
Drops files in suspicious directories
Drops invisible ELF files
Executes the "crontab" command typically for achieving persistence
Malicious sample detected (through community Yara rule)
Modifies the '.bashrc' or '.bash_profile' file typically for persisting actions
Multi AV Scanner detection for submitted file
Sample deletes itself
Sample reads /proc/mounts (often used for finding a writable filesystem)
Sample tries to kill multiple processes (SIGKILL)
Sample tries to persist itself using /etc/profile
Sample tries to persist itself using cron
Sample tries to persist itself using System V runlevels
Sample tries to set files in /etc globally writable
Terminates several processes with shell command 'killall'
Writes identical ELF files to multiple locations
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1838779 Sample: x86_32.uhavenobotsxd.elf Startdate: 24/12/2025 Architecture: LINUX Score: 100 93 94.154.35.153, 40688, 6969 SELECTELRU Ukraine 2->93 109 Malicious sample detected (through community Yara rule) 2->109 111 Multi AV Scanner detection for submitted file 2->111 11 x86_32.uhavenobotsxd.elf 2->11         started        signatures3 process4 signatures5 121 Sample tries to kill multiple processes (SIGKILL) 11->121 123 Sample reads /proc/mounts (often used for finding a writable filesystem) 11->123 14 x86_32.uhavenobotsxd.elf 11->14         started        process6 file7 75 /var/spool/cron/root, ASCII 14->75 dropped 77 /var/spool/cron/crontabs/root, ASCII 14->77 dropped 79 /root/.bashrc, ASCII 14->79 dropped 81 11 other files (10 malicious) 14->81 dropped 125 Sample tries to set files in /etc globally writable 14->125 127 Sample tries to persist itself using /etc/profile 14->127 129 Drops files in suspicious directories 14->129 131 4 other signatures 14->131 18 x86_32.uhavenobotsxd.elf sh 14->18         started        20 x86_32.uhavenobotsxd.elf sh 14->20         started        22 x86_32.uhavenobotsxd.elf sh 14->22         started        24 21 other processes 14->24 signatures8 process9 signatures10 27 sh S99backup0 18->27         started        29 sh S99backup1 20->29         started        31 sh cp 22->31         started        115 Sample tries to kill multiple processes (SIGKILL) 24->115 35 sh S99backup2 24->35         started        37 sh S99network 24->37         started        39 sh crontab 24->39         started        41 16 other processes 24->41 process11 file12 43 S99backup0 27->43         started        45 S99backup1 29->45         started        83 /usr/bin/.update, ELF 31->83 dropped 95 Writes identical ELF files to multiple locations 31->95 97 Drops invisible ELF files 31->97 99 Drops files in suspicious directories 31->99 47 S99backup2 35->47         started        49 S99network 37->49         started        85 /var/spool/cron/crontabs/tmp.xY2RIa, ASCII 39->85 dropped 101 Sample tries to persist itself using cron 39->101 103 Executes the "crontab" command typically for achieving persistence 39->103 87 /var/log/.update, ELF 41->87 dropped 89 /var/jbx/shared/.update, ELF 41->89 dropped 91 /boot/.update, ELF 41->91 dropped 105 Sample deletes itself 41->105 107 Terminates several processes with shell command 'killall' 41->107 51 .monitor 41->51         started        53 sh crontab 41->53         started        signatures13 process14 signatures15 56 S99backup0 .update 43->56         started        59 S99backup0 .update 43->59         started        61 S99backup0 .update 43->61         started        65 3 other processes 43->65 63 S99backup1 .update 45->63         started        67 5 other processes 45->67 69 6 other processes 47->69 71 6 other processes 49->71 73 2 other processes 51->73 113 Executes the "crontab" command typically for achieving persistence 53->113 process16 signatures17 117 Sample tries to kill multiple processes (SIGKILL) 63->117 119 Sample reads /proc/mounts (often used for finding a writable filesystem) 63->119
Gathering data
Gathering data
Verdict:
Malicious
Tags:
trojan gafgyt mirai Unix.Trojan.Mirai-10001386-0
YARA:
Linux_Trojan_Gafgyt_5bf62ce4 Linux_Trojan_Mirai_b14f4c5d Linux_Trojan_Mirai_5f7b67b8 Linux_Trojan_Mirai_ae9d0fa6 Linux_Trojan_Mirai_cc93863b
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:ach_202503_elf_Mirai
Author:abuse.ch
Description:Detects Mirai 'TSource' ELF files
Rule name:enterpriseapps2
Author:Tim Brown @timb_machine
Description:Enterprise apps
Rule name:Linux_Trojan_Gafgyt_5bf62ce4
Author:Elastic Security
Rule name:Linux_Trojan_Mirai_5f7b67b8
Author:Elastic Security
Rule name:Linux_Trojan_Mirai_ae9d0fa6
Author:Elastic Security
Rule name:Linux_Trojan_Mirai_b14f4c5d
Author:Elastic Security
Rule name:Linux_Trojan_Mirai_cc93863b
Author:Elastic Security
Rule name:unixredflags3
Author:Tim Brown @timb_machine
Description:Hunts for UNIX red flags

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

elf 29ded76647c1db3bf5b092b92985eb9bc36eeb843bd8af4cb7f5a90b91ecb81c

(this sample)

  
Delivery method
Distributed via web download

Comments