MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 2eb175d394a3f094f974ce6740f9446bd4e6e0d36aaf4ebe31d39cbb39c52a7f. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 11


Intelligence 11 IOCs YARA 6 File information Comments

SHA256 hash: 2eb175d394a3f094f974ce6740f9446bd4e6e0d36aaf4ebe31d39cbb39c52a7f
SHA3-384 hash: 2cd25aa72001e5cf6a3c15d5a0dafb61dab181bf051d331c54d4a13eb69c270b81b469276234335a82ace38ff5466047
SHA1 hash: 46d3129f0a8f3df4036a5b9419f1b98553814a25
MD5 hash: 58d3a17b705e09d053450c0b5b9fe62e
humanhash: jig-potato-don-juliet
File name:x86_64
Download: download sample
Signature Mirai
File size:121'240 bytes
First seen:2026-05-18 01:40:31 UTC
Last seen:Never
File type: elf
MIME type:application/x-sharedlib
ssdeep 1536:WgsKQzObGbU6B6G/F8vzlsXn1vVXwC4Vr8pbIS/Xd2mbJtnbCf/hiSYorUw:R3szWv5eVeVribddJFb0
TLSH T17EC36C06A591A0FDC086C67447AFD133FA76FC8A12357A5F27D1AE312E6AF113309792
TrID 50.1% (.) ELF Executable and Linkable format (Linux) (4022/12)
49.8% (.O) ELF Executable and Linkable format (generic) (4000/1)
Magika elf
Reporter abuse_ch
Tags:elf Hajime mirai

Intelligence


File Origin
# of uploads :
1
# of downloads :
34
Origin country :
DE DE
Vendor Threat Intelligence
No detections
Result
Verdict:
Malware
Maliciousness:

Behaviour
Changes the time when the file was created, accessed, or modified
Connection attempt
Kills processes
Changes access rights for a written file
Creating a file
DNS request
Opens a port
Launching a process
Runs as daemon
Creates or modifies files in /cron to set up autorun
Writes files to system directory
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Verdict:
Malicious
Uses P2P?:
true
Uses anti-vm?:
false
Architecture:
x86
Packer:
not packed
Botnet:
unknown
Number of open files:
76
Number of processes launched:
9
Processes remaning?
true
Remote TCP ports scanned:
23,22,2222,2323,8022
Behaviour
Process Renaming
Information Gathering
Botnet C2s
TCP botnet C2(s):
not identified
UDP botnet C2(s):
not identified
Verdict:
Malicious
File Type:
elf.64.le
First seen:
2026-05-17T23:54:00Z UTC
Last seen:
2026-05-18T00:21:00Z UTC
Hits:
~10
Status:
terminated
Behavior Graph:
%3 guuid=1cb58267-1800-0000-6df6-c7a5870c0000 pid=3207 /usr/bin/sudo guuid=41aa3b6a-1800-0000-6df6-c7a5880c0000 pid=3208 /tmp/sample.bin guuid=1cb58267-1800-0000-6df6-c7a5870c0000 pid=3207->guuid=41aa3b6a-1800-0000-6df6-c7a5880c0000 pid=3208 execve guuid=3b5a586a-1800-0000-6df6-c7a5890c0000 pid=3209 /usr/bin/dash guuid=41aa3b6a-1800-0000-6df6-c7a5880c0000 pid=3208->guuid=3b5a586a-1800-0000-6df6-c7a5890c0000 pid=3209 execve guuid=2ef8de6a-1800-0000-6df6-c7a58a0c0000 pid=3210 /usr/bin/dash guuid=41aa3b6a-1800-0000-6df6-c7a5880c0000 pid=3208->guuid=2ef8de6a-1800-0000-6df6-c7a58a0c0000 pid=3210 execve guuid=dd3d676b-1800-0000-6df6-c7a58b0c0000 pid=3211 /usr/bin/dash guuid=41aa3b6a-1800-0000-6df6-c7a5880c0000 pid=3208->guuid=dd3d676b-1800-0000-6df6-c7a58b0c0000 pid=3211 execve guuid=cd9fab6b-1800-0000-6df6-c7a58c0c0000 pid=3212 /usr/lib/ld-unix.so.2 dns net send-data zombie guuid=41aa3b6a-1800-0000-6df6-c7a5880c0000 pid=3208->guuid=cd9fab6b-1800-0000-6df6-c7a58c0c0000 pid=3212 clone cd90ef11-6295-5a8d-b4e0-57c272b97c7c bigyahu.fans:443 guuid=cd9fab6b-1800-0000-6df6-c7a58c0c0000 pid=3212->cd90ef11-6295-5a8d-b4e0-57c272b97c7c send: 346B 4f6baed0-9587-596c-82b3-fd721afe4cc1 10.0.2.3:53 guuid=cd9fab6b-1800-0000-6df6-c7a58c0c0000 pid=3212->4f6baed0-9587-596c-82b3-fd721afe4cc1 send: 30B guuid=1849b96b-1800-0000-6df6-c7a58d0c0000 pid=3213 /usr/lib/ld-unix.so.2 guuid=cd9fab6b-1800-0000-6df6-c7a58c0c0000 pid=3212->guuid=1849b96b-1800-0000-6df6-c7a58d0c0000 pid=3213 clone guuid=5b19c16b-1800-0000-6df6-c7a58e0c0000 pid=3214 /usr/lib/ld-unix.so.2 net guuid=cd9fab6b-1800-0000-6df6-c7a58c0c0000 pid=3212->guuid=5b19c16b-1800-0000-6df6-c7a58e0c0000 pid=3214 clone guuid=dbdac66b-1800-0000-6df6-c7a58f0c0000 pid=3215 /usr/lib/ld-unix.so.2 net guuid=cd9fab6b-1800-0000-6df6-c7a58c0c0000 pid=3212->guuid=dbdac66b-1800-0000-6df6-c7a58f0c0000 pid=3215 clone guuid=6772cb6b-1800-0000-6df6-c7a5900c0000 pid=3216 /usr/lib/ld-unix.so.2 net guuid=cd9fab6b-1800-0000-6df6-c7a58c0c0000 pid=3212->guuid=6772cb6b-1800-0000-6df6-c7a5900c0000 pid=3216 clone 9e8b60ce-5103-555a-be46-9798970c88a6 131.223.234.213:37215 guuid=5b19c16b-1800-0000-6df6-c7a58e0c0000 pid=3214->9e8b60ce-5103-555a-be46-9798970c88a6 con 8ae4f9ac-48e0-520f-8825-0b3d472cd934 131.223.234.213:80 guuid=5b19c16b-1800-0000-6df6-c7a58e0c0000 pid=3214->8ae4f9ac-48e0-520f-8825-0b3d472cd934 con 1017d1ac-389f-5cf7-be06-9ca63893a15e 131.223.234.213:81 guuid=5b19c16b-1800-0000-6df6-c7a58e0c0000 pid=3214->1017d1ac-389f-5cf7-be06-9ca63893a15e con e12a73fe-4db7-5263-a03f-106333bed212 131.223.234.213:8080 guuid=5b19c16b-1800-0000-6df6-c7a58e0c0000 pid=3214->e12a73fe-4db7-5263-a03f-106333bed212 con e39df27d-7e9a-500a-847e-893bb1ea63bb 131.223.234.213:52869 guuid=5b19c16b-1800-0000-6df6-c7a58e0c0000 pid=3214->e39df27d-7e9a-500a-847e-893bb1ea63bb con 926c6ed3-e929-5ec2-b41b-33cfcb7620f2 131.223.234.213:7547 guuid=5b19c16b-1800-0000-6df6-c7a58e0c0000 pid=3214->926c6ed3-e929-5ec2-b41b-33cfcb7620f2 con d4d06054-0189-5a7c-8d58-3b515c5db015 131.223.234.213:5555 guuid=5b19c16b-1800-0000-6df6-c7a58e0c0000 pid=3214->d4d06054-0189-5a7c-8d58-3b515c5db015 con 8b520ab9-77e4-54c3-9eff-97153f04e2f0 131.223.234.213:49152 guuid=5b19c16b-1800-0000-6df6-c7a58e0c0000 pid=3214->8b520ab9-77e4-54c3-9eff-97153f04e2f0 con 1d37a37a-6dd1-59f6-8e1a-f7d3e5b3f5d5 131.223.234.213:8443 guuid=5b19c16b-1800-0000-6df6-c7a58e0c0000 pid=3214->1d37a37a-6dd1-59f6-8e1a-f7d3e5b3f5d5 con 16ed42e9-8a17-5ee0-ba91-fbc78fa83d90 131.223.234.213:55158 guuid=5b19c16b-1800-0000-6df6-c7a58e0c0000 pid=3214->16ed42e9-8a17-5ee0-ba91-fbc78fa83d90 con 89340b29-a177-5eb6-affc-6f09e5434fb1 131.223.234.213:8888 guuid=5b19c16b-1800-0000-6df6-c7a58e0c0000 pid=3214->89340b29-a177-5eb6-affc-6f09e5434fb1 con 645f2bf0-3e10-5aff-a84a-decb09805b16 131.223.234.213:55000 guuid=5b19c16b-1800-0000-6df6-c7a58e0c0000 pid=3214->645f2bf0-3e10-5aff-a84a-decb09805b16 con e9e7516e-f759-5b6e-a122-5f437d3f6f11 195.121.213.18:37215 guuid=5b19c16b-1800-0000-6df6-c7a58e0c0000 pid=3214->e9e7516e-f759-5b6e-a122-5f437d3f6f11 con f0a8b0db-dd94-50e7-a85a-c3e9ca016c5f 195.121.213.18:80 guuid=5b19c16b-1800-0000-6df6-c7a58e0c0000 pid=3214->f0a8b0db-dd94-50e7-a85a-c3e9ca016c5f con 6c3f9143-c02e-55a9-85ad-ec1bd50776e8 195.121.213.18:81 guuid=5b19c16b-1800-0000-6df6-c7a58e0c0000 pid=3214->6c3f9143-c02e-55a9-85ad-ec1bd50776e8 con a9c9ac00-7067-5166-a86d-eff5ce5e55e7 195.121.213.18:8080 guuid=5b19c16b-1800-0000-6df6-c7a58e0c0000 pid=3214->a9c9ac00-7067-5166-a86d-eff5ce5e55e7 con af9445a6-623d-5901-9059-afe70d80348f 195.121.213.18:52869 guuid=5b19c16b-1800-0000-6df6-c7a58e0c0000 pid=3214->af9445a6-623d-5901-9059-afe70d80348f con eba5e116-fe8d-52c4-a388-93996672a0fd 195.121.213.18:7547 guuid=5b19c16b-1800-0000-6df6-c7a58e0c0000 pid=3214->eba5e116-fe8d-52c4-a388-93996672a0fd con f320de83-a250-55ed-b8ac-65f010b1925e 195.121.213.18:5555 guuid=5b19c16b-1800-0000-6df6-c7a58e0c0000 pid=3214->f320de83-a250-55ed-b8ac-65f010b1925e con 926b20a7-d072-5f9d-8faf-2e3d6854f47a 131.223.234.213:23 guuid=dbdac66b-1800-0000-6df6-c7a58f0c0000 pid=3215->926b20a7-d072-5f9d-8faf-2e3d6854f47a con e93a793e-56a9-558d-b60b-3f221a824047 131.223.234.213:2323 guuid=dbdac66b-1800-0000-6df6-c7a58f0c0000 pid=3215->e93a793e-56a9-558d-b60b-3f221a824047 con eb13e166-07b3-54d4-afc5-a8da2f8d50d9 195.121.213.18:23 guuid=dbdac66b-1800-0000-6df6-c7a58f0c0000 pid=3215->eb13e166-07b3-54d4-afc5-a8da2f8d50d9 con 84abba15-f476-50a9-ac71-3fc24d1ddd8c 195.121.213.18:2323 guuid=dbdac66b-1800-0000-6df6-c7a58f0c0000 pid=3215->84abba15-f476-50a9-ac71-3fc24d1ddd8c con 87a20e0a-59d6-5064-8144-ac095b92de13 156.147.210.166:23 guuid=dbdac66b-1800-0000-6df6-c7a58f0c0000 pid=3215->87a20e0a-59d6-5064-8144-ac095b92de13 con 64979b62-c279-56a2-a927-30b4641a58b5 156.147.210.166:2323 guuid=dbdac66b-1800-0000-6df6-c7a58f0c0000 pid=3215->64979b62-c279-56a2-a927-30b4641a58b5 con 21e6da34-d7ca-58be-a296-9c515b2b7250 140.122.224.171:23 guuid=dbdac66b-1800-0000-6df6-c7a58f0c0000 pid=3215->21e6da34-d7ca-58be-a296-9c515b2b7250 con bb21eb04-0447-5c4d-8b7d-bbe7a2bcfa5d 140.122.224.171:2323 guuid=dbdac66b-1800-0000-6df6-c7a58f0c0000 pid=3215->bb21eb04-0447-5c4d-8b7d-bbe7a2bcfa5d con 3220cda8-4903-55eb-a118-a4857f02f5b7 125.94.143.148:23 guuid=dbdac66b-1800-0000-6df6-c7a58f0c0000 pid=3215->3220cda8-4903-55eb-a118-a4857f02f5b7 con fc757b4a-c119-5fc8-8f2b-7793225c822f 131.223.234.213:22 guuid=6772cb6b-1800-0000-6df6-c7a5900c0000 pid=3216->fc757b4a-c119-5fc8-8f2b-7793225c822f con 886cf96c-9f9e-5813-91d9-4ff1d4033928 131.223.234.213:2222 guuid=6772cb6b-1800-0000-6df6-c7a5900c0000 pid=3216->886cf96c-9f9e-5813-91d9-4ff1d4033928 con 574bad5a-2fd7-5426-a3f4-1e48fb527fe1 131.223.234.213:8022 guuid=6772cb6b-1800-0000-6df6-c7a5900c0000 pid=3216->574bad5a-2fd7-5426-a3f4-1e48fb527fe1 con 7926d7fe-2ab6-5fa1-b87c-9e28eae5eabf 195.121.213.18:22 guuid=6772cb6b-1800-0000-6df6-c7a5900c0000 pid=3216->7926d7fe-2ab6-5fa1-b87c-9e28eae5eabf con a44fbb43-46cf-5f08-a3d1-2f0865795f03 195.121.213.18:2222 guuid=6772cb6b-1800-0000-6df6-c7a5900c0000 pid=3216->a44fbb43-46cf-5f08-a3d1-2f0865795f03 con 97f122ba-a5b8-5885-babd-2bf774fafeb4 195.121.213.18:8022 guuid=6772cb6b-1800-0000-6df6-c7a5900c0000 pid=3216->97f122ba-a5b8-5885-babd-2bf774fafeb4 con ed9066a4-f9e1-52d9-9e23-c5521a1fde0a 156.147.210.166:22 guuid=6772cb6b-1800-0000-6df6-c7a5900c0000 pid=3216->ed9066a4-f9e1-52d9-9e23-c5521a1fde0a con 5a7d4128-289b-591e-8458-e5e61fe33d00 156.147.210.166:2222 guuid=6772cb6b-1800-0000-6df6-c7a5900c0000 pid=3216->5a7d4128-289b-591e-8458-e5e61fe33d00 con 8ded07f5-be69-59bd-84b4-a08d5b845054 156.147.210.166:8022 guuid=6772cb6b-1800-0000-6df6-c7a5900c0000 pid=3216->8ded07f5-be69-59bd-84b4-a08d5b845054 con
Threat name:
Linux.Trojan.Hajime
Status:
Malicious
First seen:
2026-05-18 01:41:44 UTC
File Type:
ELF64 Little (SO)
AV detection:
13 of 24 (54.17%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
defense_evasion discovery execution linux persistence privilege_escalation
Behaviour
Reads runtime system information
Enumerates running processes
Creates/modifies Cron job
Modifies Watchdog functionality
Renames itself
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:CVE_2017_17215
Author:NDA0E
Description:Detects exploitation attempt of CVE-2017-17215
Rule name:ELF_Mirai
Author:NDA0E
Description:Detects multiple Mirai variants
Rule name:enterpriseapps2
Author:Tim Brown @timb_machine
Description:Enterprise apps
Rule name:iot_req_metachar
Rule name:Linux_Generic_Threat_1ac392ca
Author:Elastic Security
Rule name:unixredflags3
Author:Tim Brown @timb_machine
Description:Hunts for UNIX red flags

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

elf 2eb175d394a3f094f974ce6740f9446bd4e6e0d36aaf4ebe31d39cbb39c52a7f

(this sample)

  
Delivery method
Distributed via web download

Comments