MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 359c8c699bbe3b1fb338abc93403945747515a307a5bfde3de153d3056e427e0. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: 359c8c699bbe3b1fb338abc93403945747515a307a5bfde3de153d3056e427e0
SHA3-384 hash: 028a746c84564b00b96b2a3aed2d8878ed529adc076c3fd89f737d96ab548b85c9afae26bba60d66a64eda23c8254621
SHA1 hash: cd3415f48a44b2fba1f6f07985ad407cb70c24a5
MD5 hash: 2d568bcbbeb1d6636e212a326cf20ec2
humanhash: fourteen-butter-fifteen-princess
File name:sora.arm
Download: download sample
Signature Mirai
File size:28'176 bytes
First seen:2023-08-22 20:50:07 UTC
Last seen:Never
File type: elf
MIME type:application/x-executable
ssdeep 384:AOt/koxisa34beDtZwuaCBsk+G9lLSsLYSTFs9u8OtqlrNEIR9hymdGUop5hc:AWsoTAZ3alkXLvFh8nNEIHs3UozS
TLSH T1F5C2D170A2AA1CB1C6500533F7B85AC9BE570F7DE9FF3890124057BA3941D0629EA9C7
TrID 50.1% (.) ELF Executable and Linkable format (Linux) (4022/12)
49.8% (.O) ELF Executable and Linkable format (generic) (4000/1)
Reporter elfdigest
Tags:mirai

Intelligence


File Origin
# of uploads :
1
# of downloads :
101
Origin country :
DE DE
Vendor Threat Intelligence
Gathering data
Verdict:
Malicious
Uses P2P?:
false
Uses anti-vm?:
false
Architecture:
arm
Packer:
UPX
Botnet:
45.95.169.101:80/bins
Number of open files:
0
Number of processes launched:
0
Processes remaning?
false
Remote TCP ports scanned:
not identified
Behaviour
no suspicious findings
Botnet C2s
TCP botnet C2(s):
not identified
UDP botnet C2(s):
not identified
Result
Verdict:
MALICIOUS
Result
Threat name:
Detection:
malicious
Classification:
troj.evad
Score:
88 / 100
Signature
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Sample is packed with UPX
Uses known network protocols on non-standard ports
Yara detected Mirai
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1295510 Sample: sora.arm.elf Startdate: 22/08/2023 Architecture: LINUX Score: 88 42 180.75.151.90 WEBE-MY-AS-APWEBEDIGITALSDNBHDMY Malaysia 2->42 44 90.251.212.209 VodafoneGB United Kingdom 2->44 46 98 other IPs or domains 2->46 48 Malicious sample detected (through community Yara rule) 2->48 50 Multi AV Scanner detection for submitted file 2->50 52 Yara detected Mirai 2->52 54 2 other signatures 2->54 10 sora.arm.elf 2->10         started        signatures3 process4 process5 12 sora.arm.elf 10->12         started        14 sora.arm.elf 10->14         started        16 sora.arm.elf 10->16         started        process6 18 sora.arm.elf 12->18         started        20 sora.arm.elf 12->20         started        22 sora.arm.elf 14->22         started        24 sora.arm.elf 14->24         started        26 sora.arm.elf 14->26         started        process7 28 sora.arm.elf 18->28         started        30 sora.arm.elf 18->30         started        32 sora.arm.elf 18->32         started        34 sora.arm.elf 22->34         started        36 sora.arm.elf 22->36         started        process8 38 sora.arm.elf 28->38         started        40 sora.arm.elf 28->40         started       
Threat name:
Linux.Trojan.Mirai
Status:
Malicious
First seen:
2023-08-22 20:51:07 UTC
File Type:
ELF32 Little (Exe)
AV detection:
17 of 23 (73.91%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
upx
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

elf 359c8c699bbe3b1fb338abc93403945747515a307a5bfde3de153d3056e427e0

(this sample)

  
Delivery method
Distributed via web download

Comments