MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 35d990f27f535536c8c7425a79b9985a5d91b1abcf954af7a3cbc350d4739502. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 8


Intelligence 8 IOCs YARA 10 File information Comments

SHA256 hash: 35d990f27f535536c8c7425a79b9985a5d91b1abcf954af7a3cbc350d4739502
SHA3-384 hash: 778658e1d865ff75a6c3b434444a0994c284becbfd54b47e58a0ad997c4616d0baaca1936ec4ea1e171f189ca9b2ecf2
SHA1 hash: 54c01a86cc5cda75260124d23c2dcdee0b2f0d4f
MD5 hash: 2307e6aeceed183dbff8163bfacd5014
humanhash: september-beryllium-delaware-snake
File name:x86_64
Download: download sample
Signature Mirai
File size:64'192 bytes
First seen:2026-02-01 07:35:37 UTC
Last seen:2026-02-01 08:49:34 UTC
File type: elf
MIME type:application/x-executable
ssdeep 1536:4ha6o8X6H467ExqIvS90K1ESL3db9WAEjZRmwhOX:4o6dKY1xqIvSN1ESL3dTEjZzhOX
TLSH T103536B03A4D280FCC89ED1B84B9F6676ED63F8AD0135B16D27D4EA136E8EE205F5D640
telfhash t1b021bdb178460d90a1fbf672a34ae275587d0eb400e035e2c272a8f9dba6bd50875c77
TrID 50.1% (.) ELF Executable and Linkable format (Linux) (4022/12)
49.8% (.O) ELF Executable and Linkable format (generic) (4000/1)
Magika elf
Reporter abuse_ch
Tags:elf mirai

Intelligence


File Origin
# of uploads :
2
# of downloads :
468
Origin country :
DE DE
Vendor Threat Intelligence
Gathering data
Verdict:
Malicious
Uses P2P?:
true
Uses anti-vm?:
true
Architecture:
x86
Packer:
not packed
Botnet:
unknown
Number of open files:
106
Number of processes launched:
5
Processes remaning?
true
Remote TCP ports scanned:
not identified
Behaviour
Anti-VM
Persistence
Process Renaming
Information Gathering
Botnet C2s
TCP botnet C2(s):
not identified
UDP botnet C2(s):
not identified
Result
Gathering data
Status:
terminated
Behavior Graph:
%3 guuid=b393c3de-1900-0000-1144-b0d519090000 pid=2329 /usr/bin/sudo guuid=e007bde2-1900-0000-1144-b0d51d090000 pid=2333 /tmp/sample.bin guuid=b393c3de-1900-0000-1144-b0d519090000 pid=2329->guuid=e007bde2-1900-0000-1144-b0d51d090000 pid=2333 execve guuid=d960fde3-1900-0000-1144-b0d51f090000 pid=2335 /tmp/sample.bin zombie guuid=e007bde2-1900-0000-1144-b0d51d090000 pid=2333->guuid=d960fde3-1900-0000-1144-b0d51f090000 pid=2335 clone guuid=6aed07e4-1900-0000-1144-b0d520090000 pid=2336 /tmp/sample.bin zombie guuid=e007bde2-1900-0000-1144-b0d51d090000 pid=2333->guuid=6aed07e4-1900-0000-1144-b0d520090000 pid=2336 clone guuid=0dc418e4-1900-0000-1144-b0d521090000 pid=2337 /tmp/sample.bin net zombie guuid=e007bde2-1900-0000-1144-b0d51d090000 pid=2333->guuid=0dc418e4-1900-0000-1144-b0d521090000 pid=2337 clone guuid=95af1fe4-1900-0000-1144-b0d522090000 pid=2338 /tmp/sample.bin dns net send-data zombie guuid=e007bde2-1900-0000-1144-b0d51d090000 pid=2333->guuid=95af1fe4-1900-0000-1144-b0d522090000 pid=2338 clone a065268f-08f1-5ab4-a238-3418c8c192fc 33.24.203.129:63055 guuid=0dc418e4-1900-0000-1144-b0d521090000 pid=2337->a065268f-08f1-5ab4-a238-3418c8c192fc con e64b7940-08b6-5c82-a5eb-4a99b074a31b 27.119.90.197:18548 guuid=0dc418e4-1900-0000-1144-b0d521090000 pid=2337->e64b7940-08b6-5c82-a5eb-4a99b074a31b con 1fed9bcb-37f8-55ed-9d6d-df99cdebdfac 98.251.202.99:44482 guuid=0dc418e4-1900-0000-1144-b0d521090000 pid=2337->1fed9bcb-37f8-55ed-9d6d-df99cdebdfac con 6abf9dd4-ff03-5975-9ba3-df3b288461f4 195.199.121.27:62633 guuid=0dc418e4-1900-0000-1144-b0d521090000 pid=2337->6abf9dd4-ff03-5975-9ba3-df3b288461f4 con f4bf501e-178d-54c7-b35e-bbef9e27ce6c 174.66.102.105:5109 guuid=0dc418e4-1900-0000-1144-b0d521090000 pid=2337->f4bf501e-178d-54c7-b35e-bbef9e27ce6c con ac8148aa-a47f-5f2d-ae46-dd7ddc4ee4ef 104.37.33.44:22935 guuid=0dc418e4-1900-0000-1144-b0d521090000 pid=2337->ac8148aa-a47f-5f2d-ae46-dd7ddc4ee4ef con eb7e86e7-ac9e-53fa-98fb-25870fc4ca1b 103.98.104.128:7952 guuid=0dc418e4-1900-0000-1144-b0d521090000 pid=2337->eb7e86e7-ac9e-53fa-98fb-25870fc4ca1b con 03a85374-bff0-512d-80f0-f94c72fe04fc 18.106.94.177:49963 guuid=0dc418e4-1900-0000-1144-b0d521090000 pid=2337->03a85374-bff0-512d-80f0-f94c72fe04fc con 4a513849-46ec-55bc-a7af-27917d473976 46.245.140.222:35135 guuid=0dc418e4-1900-0000-1144-b0d521090000 pid=2337->4a513849-46ec-55bc-a7af-27917d473976 con 3263dc8d-f4b5-5613-a5c4-2c76015bfb65 132.185.244.183:8090 guuid=0dc418e4-1900-0000-1144-b0d521090000 pid=2337->3263dc8d-f4b5-5613-a5c4-2c76015bfb65 con eaf94305-a2d8-52b5-b862-1a2eba555441 83.1.232.98:46540 guuid=0dc418e4-1900-0000-1144-b0d521090000 pid=2337->eaf94305-a2d8-52b5-b862-1a2eba555441 con 369be0e8-b732-53e4-a62e-4b23a2d7b366 149.237.209.246:23224 guuid=0dc418e4-1900-0000-1144-b0d521090000 pid=2337->369be0e8-b732-53e4-a62e-4b23a2d7b366 con 1c110696-1d52-5c25-ac5b-1448ecccc760 139.32.156.132:44853 guuid=0dc418e4-1900-0000-1144-b0d521090000 pid=2337->1c110696-1d52-5c25-ac5b-1448ecccc760 con aa7bce72-45fe-5469-91e5-178dcc339ee1 133.148.152.48:53953 guuid=0dc418e4-1900-0000-1144-b0d521090000 pid=2337->aa7bce72-45fe-5469-91e5-178dcc339ee1 con a8a86be8-a6bc-5a66-a0cb-162f297b76b9 4.77.120.191:34386 guuid=0dc418e4-1900-0000-1144-b0d521090000 pid=2337->a8a86be8-a6bc-5a66-a0cb-162f297b76b9 con e4ede220-a192-5cc4-9bcb-c3de08b6c940 75.70.107.140:59882 guuid=0dc418e4-1900-0000-1144-b0d521090000 pid=2337->e4ede220-a192-5cc4-9bcb-c3de08b6c940 con e391aa41-4795-5845-bd38-f544425572fe 78.211.168.225:4941 guuid=0dc418e4-1900-0000-1144-b0d521090000 pid=2337->e391aa41-4795-5845-bd38-f544425572fe con 8690dec1-495c-557f-b3f5-8a39a7c74646 50.30.216.159:5364 guuid=0dc418e4-1900-0000-1144-b0d521090000 pid=2337->8690dec1-495c-557f-b3f5-8a39a7c74646 con 59e6b41f-6fba-5ecc-966b-8b7b0c77ccdd 122.145.17.214:49656 guuid=0dc418e4-1900-0000-1144-b0d521090000 pid=2337->59e6b41f-6fba-5ecc-966b-8b7b0c77ccdd con 244252de-f6f7-5bab-82bb-532c0017b123 84.144.38.198:56256 guuid=0dc418e4-1900-0000-1144-b0d521090000 pid=2337->244252de-f6f7-5bab-82bb-532c0017b123 con 11dc65ca-21fa-5e6c-993f-14f5ab38fef7 94.247.43.254:53 guuid=95af1fe4-1900-0000-1144-b0d522090000 pid=2338->11dc65ca-21fa-5e6c-993f-14f5ab38fef7 send: 35B bb5d4ad8-b62f-53fa-8eb4-02a82373cc88 dontbeabitch.geek:4515 guuid=95af1fe4-1900-0000-1144-b0d522090000 pid=2338->bb5d4ad8-b62f-53fa-8eb4-02a82373cc88 send: 7B
Result
Threat name:
Detection:
malicious
Classification:
spre.troj
Score:
76 / 100
Signature
Antivirus / Scanner detection for submitted sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Sample tries to kill multiple processes (SIGKILL)
Yara detected Mirai
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1861165 Sample: x86_64.elf Startdate: 01/02/2026 Architecture: LINUX Score: 76 22 Malicious sample detected (through community Yara rule) 2->22 24 Antivirus / Scanner detection for submitted sample 2->24 26 Multi AV Scanner detection for submitted file 2->26 28 Yara detected Mirai 2->28 7 x86_64.elf 2->7         started        9 python3.8 dpkg 2->9         started        process3 process4 11 x86_64.elf 7->11         started        14 x86_64.elf 7->14         started        16 x86_64.elf 7->16         started        18 x86_64.elf 7->18         started        signatures5 30 Sample tries to kill multiple processes (SIGKILL) 11->30 20 x86_64.elf 14->20         started        process6
Threat name:
Linux.Backdoor.Mirai
Status:
Malicious
First seen:
2026-02-01 07:36:19 UTC
File Type:
ELF64 Little (Exe)
AV detection:
11 of 36 (30.56%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
defense_evasion discovery linux
Behaviour
Reads runtime system information
Changes its process name
Enumerates running processes
Modifies Watchdog functionality
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:ELF_IoT_Persistence_Hunt
Author:4r4
Description:Hunts for ELF files with persistence and download capabilities
Rule name:ELF_Toriilike_persist
Author:4r4
Description:Detects Torii IoT Botnet (stealthier Mirai alternative)
Reference:Identified via researched data
Rule name:Linux_Trojan_Gafgyt_33b4111a
Author:Elastic Security
Rule name:Linux_Trojan_Gafgyt_620087b9
Author:Elastic Security
Rule name:Linux_Trojan_Gafgyt_807911a2
Author:Elastic Security
Rule name:Linux_Trojan_Gafgyt_9e9530a7
Author:Elastic Security
Rule name:Linux_Trojan_Gafgyt_d4227dbf
Author:Elastic Security
Rule name:Linux_Trojan_Gafgyt_d996d335
Author:Elastic Security
Rule name:Linux_Trojan_Mirai_e0cf29e2
Author:Elastic Security
Rule name:unixredflags3
Author:Tim Brown @timb_machine
Description:Hunts for UNIX red flags

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

elf 35d990f27f535536c8c7425a79b9985a5d91b1abcf954af7a3cbc350d4739502

(this sample)

  
Delivery method
Distributed via web download

Comments