MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 31120e0e7d31de9bb315b25bc75af459a0e62200d4fd5e30394e3cde5e1b9ff3. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: 31120e0e7d31de9bb315b25bc75af459a0e62200d4fd5e30394e3cde5e1b9ff3
SHA3-384 hash: 264f2dd6fef71c029f75147f0f9854b165d2c89b8d77067a2f9b70619969455d85a0499569413f43c07f04e47ed08ed9
SHA1 hash: 15d9c2d3150cb22b70966095c3fbec269fef3988
MD5 hash: 5aa6d06897a9aed0d3640073167358c5
humanhash: colorado-magazine-cat-romeo
File name:mips
Download: download sample
Signature Mirai
File size:38'600 bytes
First seen:2025-08-19 03:10:20 UTC
Last seen:Never
File type: elf
MIME type:application/x-executable
ssdeep 768:OtoyYG4PV2Ay+3//BxkzJ4jQs5A/x18WxZQ2haEa:bbnVByK/phQ9jvMEa
TLSH T1600352557A629FEEF32886354BB78B30A79833D227E1D684D25CD9001FB034D685FB98
telfhash t12cf01518503c17b4e3c54ddeabedef38a48081db5e661f378840daaaa626a818c01c6c
Magika elf
Reporter abuse_ch
Tags:elf mirai

Intelligence


File Origin
# of uploads :
1
# of downloads :
75
Origin country :
DE DE
Vendor Threat Intelligence
Result
Verdict:
Suspicious
Maliciousness:

Behaviour
DNS request
Receives data from a server
Runs as daemon
Opens a port
Sends data to a server
Connection attempt
Status:
terminated
Behavior Graph:
%3 guuid=53e6a803-1a00-0000-de64-bf63dc110000 pid=4572 /usr/bin/sudo guuid=b1599105-1a00-0000-de64-bf63e4110000 pid=4580 /tmp/sample.bin guuid=53e6a803-1a00-0000-de64-bf63dc110000 pid=4572->guuid=b1599105-1a00-0000-de64-bf63e4110000 pid=4580 execve
Result
Threat name:
n/a
Detection:
malicious
Classification:
n/a
Score:
48 / 100
Signature
Multi AV Scanner detection for submitted file
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1759779 Sample: mips.elf Startdate: 19/08/2025 Architecture: LINUX Score: 48 18 102.130.193.164 ZAP-AngolaAO Angola 2->18 20 155.17.53.150 ZAMRENZM United States 2->20 22 99 other IPs or domains 2->22 24 Multi AV Scanner detection for submitted file 2->24 8 mips.elf 2->8         started        10 python3.8 dpkg 2->10         started        signatures3 process4 process5 12 mips.elf 8->12         started        process6 14 mips.elf 12->14         started        16 mips.elf 12->16         started       
Threat name:
Linux.Worm.Mirai
Status:
Malicious
First seen:
2025-08-19 03:10:55 UTC
File Type:
ELF32 Big (Exe)
AV detection:
10 of 24 (41.67%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  9/10
Tags:
discovery
Behaviour
System Network Configuration Discovery
Contacts a large (107873) amount of remote hosts
Creates a large amount of network flows
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

elf 31120e0e7d31de9bb315b25bc75af459a0e62200d4fd5e30394e3cde5e1b9ff3

(this sample)

  
Delivery method
Distributed via web download

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (GUARD_CF)high
Reviews
IDCapabilitiesEvidence
WIN32_PROCESS_APICan Create Process and Threadskernel32.dll::CloseHandle
kernel32.dll::CreateThread
WIN_BASE_APIUses Win Base APIkernel32.dll::LoadLibraryW
kernel32.dll::LoadLibraryExW
kernel32.dll::GetSystemInfo
WIN_BASE_EXEC_APICan Execute other programskernel32.dll::WriteConsoleW
kernel32.dll::SetConsoleCtrlHandler
kernel32.dll::GetConsoleMode
WIN_BASE_IO_APICan Create Fileskernel32.dll::GetSystemDirectoryA

Comments