MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 2dfd6033e90142d39c0da68aa7c029a0fd80cb2d4974574399d5c605d1347dfa. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 10


Intelligence 10 IOCs YARA 4 File information Comments

SHA256 hash: 2dfd6033e90142d39c0da68aa7c029a0fd80cb2d4974574399d5c605d1347dfa
SHA3-384 hash: c70fc617f33bc0b306db18d8b714aa56287e1b7db9e0e873218b98ddd6e84b56e4ae0650771e8ed96444d970082c8b44
SHA1 hash: 6499bcb5a0077a82ef115d70de3591f7d186a3d1
MD5 hash: 30f5710edbcd95239cc20eb0566a4f94
humanhash: wyoming-georgia-potato-victor
File name:mpsl
Download: download sample
Signature Mirai
File size:241'008 bytes
First seen:2025-10-22 21:56:21 UTC
Last seen:Never
File type: elf
MIME type:application/x-executable
ssdeep 3072:4vvnl8j9FbewRmk8e6rp0KiUVXktAGQIhyc:4vvnWpFbewRke6p0giYIhR
TLSH T1D534B60A6B519EF7D86FCD3705F5870125CCB45722A83B3B7674C62DB91AA0B09E38B4
Magika elf
Reporter abuse_ch
Tags:elf mirai

Intelligence


File Origin
# of uploads :
1
# of downloads :
78
Origin country :
DE DE
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Deleting a recently created file
Runs as daemon
Removes directories
Mounts file systems
Opens a port
Kills processes
Sends data to a server
Connection attempt
Substitutes an application name
Verdict:
Malicious
File Type:
elf.32.le
First seen:
2025-10-22T19:55:00Z UTC
Last seen:
2025-10-22T21:26:00Z UTC
Hits:
~10
Detections:
HEUR:Backdoor.Linux.Mirai.hj HEUR:Backdoor.Linux.Mirai.gen HEUR:Exploit.Linux.CVE-2017-17215.a
Status:
terminated
Behavior Graph:
%3 guuid=3c94bcdc-1800-0000-2c28-66634d0a0000 pid=2637 /usr/bin/sudo guuid=ec46efde-1800-0000-2c28-6663560a0000 pid=2646 /tmp/sample.bin guuid=3c94bcdc-1800-0000-2c28-66634d0a0000 pid=2637->guuid=ec46efde-1800-0000-2c28-6663560a0000 pid=2646 execve
Result
Threat name:
Gafgyt, Mirai
Detection:
malicious
Classification:
spre.troj.evad
Score:
100 / 100
Signature
Antivirus / Scanner detection for submitted sample
Connects to many ports of the same IP (likely port scanning)
Multi AV Scanner detection for submitted file
Reads system files that contain records of logged in users
Sample deletes itself
Sample reads /proc/mounts (often used for finding a writable filesystem)
Sample tries to kill multiple processes (SIGKILL)
Suricata IDS alerts for network traffic
Uses known network protocols on non-standard ports
Yara detected Gafgyt
Yara detected Mirai
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1800184 Sample: mpsl.elf Startdate: 23/10/2025 Architecture: LINUX Score: 100 130 197.187.133.185 airtel-tz-asTZ Tanzania United Republic of 2->130 132 41.21.239.30, 37215 Vodacom-VBZA South Africa 2->132 134 98 other IPs or domains 2->134 142 Suricata IDS alerts for network traffic 2->142 144 Antivirus / Scanner detection for submitted sample 2->144 146 Multi AV Scanner detection for submitted file 2->146 148 4 other signatures 2->148 15 systemd gdm3 2->15         started        17 mpsl.elf 2->17         started        20 systemd gpu-manager 2->20         started        22 36 other processes 2->22 signatures3 process4 file5 25 gdm3 gdm-session-worker 15->25         started        27 gdm3 gdm-session-worker 15->27         started        38 3 other processes 15->38 136 Sample deletes itself 17->136 138 Sample reads /proc/mounts (often used for finding a writable filesystem) 17->138 29 mpsl.elf 17->29         started        32 mpsl.elf 17->32         started        34 mpsl.elf 17->34         started        36 mpsl.elf 17->36         started        40 8 other processes 20->40 128 /var/log/wtmp, data 22->128 dropped 140 Reads system files that contain records of logged in users 22->140 42 5 other processes 22->42 signatures6 process7 signatures8 44 gdm-session-worker gdm-x-session 25->44         started        46 gdm-session-worker gdm-wayland-session 27->46         started        162 Sample tries to kill multiple processes (SIGKILL) 29->162 164 Sample reads /proc/mounts (often used for finding a writable filesystem) 29->164 48 mpsl.elf 32->48         started        50 sh grep 40->50         started        52 sh grep 40->52         started        54 sh grep 40->54         started        58 5 other processes 40->58 56 language-validate 42->56         started        process9 process10 60 gdm-x-session dbus-run-session 44->60         started        62 gdm-x-session Xorg Xorg.wrap Xorg 44->62         started        64 gdm-x-session Default 44->64         started        66 gdm-wayland-session dbus-run-session 46->66         started        process11 68 dbus-run-session dbus-daemon 60->68         started        71 dbus-run-session gnome-session gnome-session-binary 1 60->71         started        73 Xorg sh 62->73         started        75 Xorg sh 62->75         started        77 dbus-run-session dbus-daemon 66->77         started        79 dbus-run-session gnome-session gnome-session-binary 1 66->79         started        signatures12 150 Sample tries to kill multiple processes (SIGKILL) 68->150 152 Sample reads /proc/mounts (often used for finding a writable filesystem) 68->152 81 dbus-daemon 68->81         started        83 dbus-daemon 68->83         started        92 8 other processes 68->92 85 gnome-session-binary sh gnome-shell 71->85         started        94 18 other processes 71->94 88 sh xkbcomp 73->88         started        90 sh xkbcomp 75->90         started        96 7 other processes 77->96 98 2 other processes 79->98 process13 signatures14 100 dbus-daemon at-spi-bus-launcher 81->100         started        102 dbus-daemon gjs 83->102         started        154 Sample reads /proc/mounts (often used for finding a writable filesystem) 85->154 105 gnome-shell ibus-daemon 85->105         started        113 8 other processes 92->113 107 gsd-print-notifications 94->107         started        115 2 other processes 94->115 109 dbus-daemon false 96->109         started        111 dbus-daemon false 96->111         started        117 5 other processes 96->117 process15 signatures16 119 at-spi-bus-launcher dbus-daemon 100->119         started        156 Sample reads /proc/mounts (often used for finding a writable filesystem) 102->156 122 gsd-print-notifications gsd-printer 107->122         started        process17 signatures18 158 Sample tries to kill multiple processes (SIGKILL) 119->158 160 Sample reads /proc/mounts (often used for finding a writable filesystem) 119->160 124 dbus-daemon 119->124         started        process19 process20 126 dbus-daemon at-spi2-registryd 124->126         started       
Threat name:
Linux.Worm.Mirai
Status:
Malicious
First seen:
2025-10-22 21:57:44 UTC
File Type:
ELF32 Little (Exe)
AV detection:
16 of 24 (66.67%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
discovery
Behaviour
Reads runtime system information
Deletes itself
Verdict:
Malicious
Tags:
Unix.Trojan.Mirai-9441505-0
YARA:
n/a
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:CVE_2017_17215
Author:NDA0E
Description:Detects exploitation attempt of CVE-2017-17215
Rule name:ELF_Mirai
Author:NDA0E
Description:Detects multiple Mirai variants
Rule name:linux_generic_ipv6_catcher
Author:@_lubiedo
Description:ELF samples using IPv6 addresses
Rule name:unixredflags3
Author:Tim Brown @timb_machine
Description:Hunts for UNIX red flags

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

elf 2dfd6033e90142d39c0da68aa7c029a0fd80cb2d4974574399d5c605d1347dfa

(this sample)

  
Delivery method
Distributed via web download

Comments