MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 35191259be0a20383758621a2ab073022797eabebd6e908818824a7257702463. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: 35191259be0a20383758621a2ab073022797eabebd6e908818824a7257702463
SHA3-384 hash: c75369452b90756016c610569fc4099cb1247ee177bd75caa872b2e5fb3143dfb984cae9da7de530b202e8470ef2d4b7
SHA1 hash: 37e314524eaf270486de8a099b855505dda3cec9
MD5 hash: 356aa6ed253144fb7cab86f6df18a5fb
humanhash: snake-yankee-dakota-seven
File name:mips
Download: download sample
Signature Mirai
File size:31'360 bytes
First seen:2025-08-18 04:09:35 UTC
Last seen:Never
File type: elf
MIME type:application/x-executable
ssdeep 384:rpbUt0VgEuijlzZ4vz1PsDUplyH1DV9XUzauRQRml0FQUp/p4bY62Ltf5sS:rp4t0VgEuiBZedl+V9XUeUc3/OsRxsS
TLSH T146E252457A319FEEF72887354BB78B20A74833D227E0D684D66DD9041E7034D689FBA8
telfhash t14ff0301c283c03f5c3c88c5d1aedef34f4a184db9a762e338d40e66aa6719438c00c2c
Magika elf
Reporter abuse_ch
Tags:elf mirai

Intelligence


File Origin
# of uploads :
1
# of downloads :
54
Origin country :
DE DE
Vendor Threat Intelligence
Result
Verdict:
Suspicious
Maliciousness:

Behaviour
Receives data from a server
Opens a port
DNS request
Runs as daemon
Sends data to a server
Connection attempt
Status:
terminated
Behavior Graph:
%3 guuid=82c3de12-1800-0000-b020-f085230d0000 pid=3363 /usr/bin/sudo guuid=ecd93b15-1800-0000-b020-f0852a0d0000 pid=3370 /tmp/sample.bin guuid=82c3de12-1800-0000-b020-f085230d0000 pid=3363->guuid=ecd93b15-1800-0000-b020-f0852a0d0000 pid=3370 execve
Result
Threat name:
n/a
Detection:
malicious
Classification:
n/a
Score:
48 / 100
Signature
Multi AV Scanner detection for submitted file
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1759027 Sample: mips.elf Startdate: 18/08/2025 Architecture: LINUX Score: 48 16 169.254.169.254, 80 USDOSUS Reserved 2->16 18 conn.magicpacketlease.org 45.125.66.90, 23120, 56576 TELE-ASTeleAsiaLimitedHK Hong Kong 2->18 20 3 other IPs or domains 2->20 22 Multi AV Scanner detection for submitted file 2->22 8 mips.elf 2->8         started        10 python3.8 dpkg 2->10         started        signatures3 process4 process5 12 mips.elf 8->12         started        process6 14 mips.elf 12->14         started       
Threat name:
Linux.Worm.Mirai
Status:
Malicious
First seen:
2025-08-18 04:10:38 UTC
File Type:
ELF32 Big (Exe)
AV detection:
12 of 24 (50.00%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
discovery
Behaviour
System Network Configuration Discovery
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

elf 35191259be0a20383758621a2ab073022797eabebd6e908818824a7257702463

(this sample)

  
Delivery method
Distributed via web download

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_NXMissing Non-Executable Memory Protectioncritical
CHECK_PIEMissing Position-Independent Executable (PIE) Protectionhigh

Comments