MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 32fbcfdd4e3a032cf3d10c8b32eb395ca3ad286f29d4f355ccfe43c7d1e88e8e. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 11


Intelligence 11 IOCs YARA File information Comments

SHA256 hash: 32fbcfdd4e3a032cf3d10c8b32eb395ca3ad286f29d4f355ccfe43c7d1e88e8e
SHA3-384 hash: 713048a3543b25a39d773a5ace98b09700e123cd2fba2a781e2ddd9052fceb88cd2d1b832970b9d79a31be85e6c444b1
SHA1 hash: 968b253e5ddd50d165dd90da8e409483df7865ec
MD5 hash: e3abfa6136b6004687eecee5bed69cbe
humanhash: magnesium-bluebird-batman-mobile
File name:ppc
Download: download sample
Signature Mirai
File size:67'576 bytes
First seen:2025-01-09 11:46:50 UTC
Last seen:Never
File type: elf
MIME type:application/x-executable
ssdeep 1536:ZjVO2KsrO4zb5BdV0BpTaQnQSe1ECj5ds:CPsTHdVqNQSe1bjrs
TLSH T17A634A01775C4E43D1A61EF8293F27E193EEEE9021F4F5842A0ED6465272E33994AFD8
Magika elf
Reporter abuse_ch
Tags:elf mirai

Intelligence


File Origin
# of uploads :
1
# of downloads :
130
Origin country :
DE DE
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Connection attempt
Runs as daemon
Opens a port
Receives data from a server
Sends data to a server
Substitutes an application name
Performs a bruteforce attack in the network
Verdict:
Unknown
Threat level:
  0/10
Confidence:
100%
Tags:
anti-debug lolbin remote
Result
Verdict:
MALICIOUS
Result
Threat name:
Detection:
malicious
Classification:
troj
Score:
64 / 100
Signature
Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Yara detected Mirai
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1586639 Sample: ppc.elf Startdate: 09/01/2025 Architecture: LINUX Score: 64 18 23.235.167.100, 23 XIAOZHIYUN1-AS-APICIDCNETWORKUS United States 2->18 20 14.173.99.216 VNPT-AS-VNVNPTCorpVN Viet Nam 2->20 22 98 other IPs or domains 2->22 24 Antivirus / Scanner detection for submitted sample 2->24 26 Multi AV Scanner detection for submitted file 2->26 28 Yara detected Mirai 2->28 8 ppc.elf 2->8         started        signatures3 process4 process5 10 ppc.elf 8->10         started        process6 12 ppc.elf 10->12         started        14 ppc.elf 10->14         started        16 ppc.elf 10->16         started       
Threat name:
Linux.Trojan.Mirai
Status:
Malicious
First seen:
2025-01-09 12:11:01 UTC
AV detection:
24 of 38 (63.16%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:mirai botnet:wicked linux
Verdict:
Malicious
Tags:
Unix.Dropper.Mirai-7135957-0
YARA:
n/a
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

elf 32fbcfdd4e3a032cf3d10c8b32eb395ca3ad286f29d4f355ccfe43c7d1e88e8e

(this sample)

  
Delivery method
Distributed via web download

Comments