MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 3940c974e3a4c6f4dc6ab3b152ee87a301cc44bf1091ccf6f942c05484031f84. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 7


Intelligence 7 IOCs YARA 3 File information Comments

SHA256 hash: 3940c974e3a4c6f4dc6ab3b152ee87a301cc44bf1091ccf6f942c05484031f84
SHA3-384 hash: aa61c1ceafba61d928f5e0cf1d23e8618d87dbca1411b4c1be1d0ce600169fb57188e8f0ccfd5efbed503e5bf8b1edd8
SHA1 hash: 5ff51ff772e073c1ee817477ef6110375a7779c5
MD5 hash: f4813dac96f2f30e72e0a2f7a84e92ed
humanhash: pluto-connecticut-mississippi-diet
File name:xnxnxnxnxnxnxnxnmipsxnxn
Download: download sample
Signature Mirai
File size:78'936 bytes
First seen:2025-11-21 08:41:34 UTC
Last seen:2025-11-21 21:56:08 UTC
File type: elf
MIME type:application/x-executable
ssdeep 1536:3UKoqZdNp5Qi1kWL4Ya81VZ7pwzPFch79TUBzPx0yRIUhgH7ZovEYworm:3UJwdv5JWYaCRre/pIV7ZovEbSm
TLSH T12E7302B48C16AA40F039947AEA076EFEA741C7C8E1AA77437F950908ACF48779462D84
Magika elf
Reporter abuse_ch
Tags:elf UPX
File size (compressed) :78'936 bytes
File size (de-compressed) :199'348 bytes
Format:linux/mips
Unpacked file: 40af8fed89c2ffe82d3c7d01e6ad9002d1b5e293268c97f404af4570cc47dc8b

Intelligence


File Origin
# of uploads :
4
# of downloads :
80
Origin country :
DE DE
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Connection attempt
DNS request
Runs as daemon
Kills processes
Creating a file
Locks files
Sends data to a server
Substitutes an application name
Verdict:
Malicious
File Type:
elf.32.be
First seen:
2025-11-21T06:18:00Z UTC
Last seen:
2025-11-22T10:20:00Z UTC
Hits:
~10
Status:
terminated
Behavior Graph:
%3 guuid=800e1e27-1a00-0000-ff35-8278a20a0000 pid=2722 /usr/bin/sudo guuid=47283729-1a00-0000-ff35-8278a80a0000 pid=2728 /tmp/sample.bin guuid=800e1e27-1a00-0000-ff35-8278a20a0000 pid=2722->guuid=47283729-1a00-0000-ff35-8278a80a0000 pid=2728 execve
Result
Threat name:
n/a
Detection:
malicious
Classification:
evad
Score:
52 / 100
Signature
Multi AV Scanner detection for submitted file
Sample is packed with UPX
Behaviour
Behavior Graph:
Threat name:
Linux.Trojan.Multiverze
Status:
Malicious
First seen:
2025-11-21 08:31:47 UTC
File Type:
ELF32 Big (Exe)
AV detection:
5 of 24 (20.83%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  6/10
Tags:
antivm discovery upx
Behaviour
Reads runtime system information
System Network Configuration Discovery
Writes file to tmp directory
Changes its process name
Reads system network configuration
Checks hardware identifiers (DMI)
Enumerates active TCP sockets
Enumerates running processes
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:linux_generic_ipv6_catcher
Author:@_lubiedo
Description:ELF samples using IPv6 addresses
Rule name:SUSP_ELF_LNX_UPX_Compressed_File
Author:Florian Roth (Nextron Systems)
Description:Detects a suspicious ELF binary with UPX compression
Reference:Internal Research
Rule name:upx_packed_elf_v1
Author:RandomMalware

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

elf 3940c974e3a4c6f4dc6ab3b152ee87a301cc44bf1091ccf6f942c05484031f84

(this sample)

  
Delivery method
Distributed via web download

Comments