MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 322033c343b69dbb60e3c6af0b760e46fe990881426d4973da401443545fa6cd. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 5


Intelligence 5 IOCs YARA 1 File information Comments 1

SHA256 hash: 322033c343b69dbb60e3c6af0b760e46fe990881426d4973da401443545fa6cd
SHA3-384 hash: c467243bb9e6753f657950e774254291ff5d596a3a68a7f6cd1b00dc2a45b6f45fe8f7ab4582de6f8bde606dc50442ab
SHA1 hash: 4885df07bdde461b7aeb85910a94490877a8a19e
MD5 hash: f0c12a237e907121a6b9380301061b45
humanhash: delaware-three-xray-pasta
File name:f0c12a237e907121a6b9380301061b45
Download: download sample
Signature Mirai
File size:55'344 bytes
First seen:2021-07-08 14:01:40 UTC
Last seen:Never
File type: elf
MIME type:application/x-executable
ssdeep 768:UxIRHrLBjQoObRS7BIIRS7BOx2RbrY2tRH68kvfP4jlmunpcv+aUQBheo41fNJgT:/RHfFfORax2gvfP2lmunqvBBpWfNJ0V
TLSH T1C843C85E3E218FBCFBAD863553B39E269648339637E1C584D29CD6012E7024D341FBA9
telfhash t12af01748883813f49b505dd82bedfeb7d1a210cf5a159e378e00ee999a66a428e00c1c
Reporter zbetcheckin
Tags:32 elf mips mirai

Intelligence


File Origin
# of uploads :
1
# of downloads :
131
Origin country :
n/a
Vendor Threat Intelligence
Verdict:
Malicious
Uses P2P?:
false
Uses anti-vm?:
false
Architecture:
mips
Packer:
not packed
Botnet:
unknown
Number of open files:
4
Number of processes launched:
3
Processes remaning?
false
Remote TCP ports scanned:
not identified
Behaviour
no suspicious findings
Botnet C2s
TCP botnet C2(s):
136.144.41.167:37212
UDP botnet C2(s):
not identified
Result
Verdict:
MALICIOUS
Threat name:
Linux.Trojan.Mirai
Status:
Malicious
First seen:
2021-07-08 14:02:08 UTC
AV detection:
13 of 29 (44.83%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  1/10
Tags:
linux
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:SUSP_XORed_Mozilla
Author:Florian Roth
Description:Detects suspicious XORed keyword - Mozilla/5.0
Reference:Internal Research

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

elf 322033c343b69dbb60e3c6af0b760e46fe990881426d4973da401443545fa6cd

(this sample)

  
Delivery method
Distributed via web download

Comments



Avatar
zbet commented on 2021-07-08 14:01:41 UTC

url : hxxp://136.144.41.167/bins/telnet.mips