MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 3351fdc4bd185a46d4c456bac08821f4ea1e0095edff7cda511f2ce28d5d7ae9. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 11


Intelligence 11 IOCs YARA File information Comments

SHA256 hash: 3351fdc4bd185a46d4c456bac08821f4ea1e0095edff7cda511f2ce28d5d7ae9
SHA3-384 hash: 5a1fda69e488e4c0a84683742dcf39b7c387b89a6d03befb678009992f4655ee660ff652371fe6272fb4064eab7e9ec6
SHA1 hash: b01371bc95651bf8429c0d2e36317223fc40dd92
MD5 hash: 42b426757f3d84a427c52ab3ab758abf
humanhash: twelve-idaho-stream-seventeen
File name:mpsl
Download: download sample
Signature Mirai
File size:109'604 bytes
First seen:2025-11-08 12:44:18 UTC
Last seen:Never
File type: elf
MIME type:application/x-executable
ssdeep 1536:ZBxiywA6alZBX2sQKjLdfqO199wDo+bYthTO+iZjGAfGd:sulZBLBqO1w2fwjGI
TLSH T1D8B3D646BF612EFBDC5FCC374AE91706258C651A12B97F3A7534D928B60B20F0AD3864
TrID 50.1% (.) ELF Executable and Linkable format (Linux) (4022/12)
49.8% (.O) ELF Executable and Linkable format (generic) (4000/1)
Magika elf
Reporter abuse_ch
Tags:elf mirai upx-dec


Avatar
abuse_ch
UPX decompressed file, sourced from SHA256 d876876166b2d1ea391a0e3f3f237e4b62625c2d9f8fd1f7fa2a96940cd718c9
File size (compressed) :40'112 bytes
File size (de-compressed) :109'604 bytes
Format:linux/mipsel
Packed file: d876876166b2d1ea391a0e3f3f237e4b62625c2d9f8fd1f7fa2a96940cd718c9

Intelligence


File Origin
# of uploads :
1
# of downloads :
59
Origin country :
NL NL
Vendor Threat Intelligence
Result
Verdict:
Clean
Maliciousness:

Behaviour
Connection attempt
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
mirai
Verdict:
Malicious
Uses P2P?:
false
Uses anti-vm?:
false
Architecture:
mips
Packer:
not packed
Botnet:
unknown
Number of open files:
7
Number of processes launched:
1
Processes remaning?
false
Remote TCP ports scanned:
not identified
Behaviour
no suspicious findings
Botnet C2s
TCP botnet C2(s):
not identified
UDP botnet C2(s):
not identified
Verdict:
Malicious
File Type:
elf.32.le
First seen:
2025-11-08T09:52:00Z UTC
Last seen:
2025-11-10T06:15:00Z UTC
Hits:
~10
Detections:
HEUR:Backdoor.Linux.Mirai.b
Status:
terminated
Behavior Graph:
%3 guuid=e45d36d8-1a00-0000-f554-692e6a0b0000 pid=2922 /usr/bin/sudo guuid=630e70da-1a00-0000-f554-692e710b0000 pid=2929 /tmp/sample.bin guuid=e45d36d8-1a00-0000-f554-692e6a0b0000 pid=2922->guuid=630e70da-1a00-0000-f554-692e710b0000 pid=2929 execve
Gathering data
Result
Threat name:
n/a
Detection:
malicious
Classification:
n/a
Score:
48 / 100
Signature
Multi AV Scanner detection for submitted file
Behaviour
Behavior Graph:
Threat name:
Linux.Worm.Mirai
Status:
Malicious
First seen:
2025-11-08 12:45:27 UTC
File Type:
ELF32 Little (Exe)
AV detection:
14 of 24 (58.33%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:mirai
Verdict:
Malicious
Tags:
Unix.Trojan.Mirai-10017641-0
YARA:
n/a
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

elf 3351fdc4bd185a46d4c456bac08821f4ea1e0095edff7cda511f2ce28d5d7ae9

(this sample)

  
Delivery method
Distributed via web download

Comments