MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 3a22c5730cfc5279e2214d547fc6b56e9f23810631892e7d98189e731af22dc5. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 9


Intelligence 9 IOCs YARA File information Comments

SHA256 hash: 3a22c5730cfc5279e2214d547fc6b56e9f23810631892e7d98189e731af22dc5
SHA3-384 hash: e893a7ac8e7d94f055942fd0fee9d9baaa581c85a0d29234e3608659f8c0430af1ce98ccca21fbf882af0adb8b104d37
SHA1 hash: 8a3fc3291aea705d0f30375c4bb86a27a8a9c5e6
MD5 hash: 984317f312700ba605d65b99813664cb
humanhash: lake-red-spaghetti-july
File name:sora.arm
Download: download sample
Signature Mirai
File size:28'176 bytes
First seen:2023-09-05 08:50:10 UTC
Last seen:Never
File type: elf
MIME type:application/x-executable
ssdeep 384:ARt/koxisa34beDtZwuaCBsk+G9lLSsLYSTFs9u8OtqlrNEkEdDhymdGUop5hU:A7soTAZ3alkXLvFh8nNEkODs3Uozu
TLSH T197C2D130A6A92CB1C7600576E7B857C6BF530F7DE6FE3880114057BA7882D0669EE9C7
TrID 50.1% (.) ELF Executable and Linkable format (Linux) (4022/12)
49.8% (.O) ELF Executable and Linkable format (generic) (4000/1)
Reporter elfdigest
Tags:mirai

Intelligence


File Origin
# of uploads :
1
# of downloads :
94
Origin country :
DE DE
Vendor Threat Intelligence
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
anti-debug masquerade mirai
Verdict:
Malicious
Uses P2P?:
false
Uses anti-vm?:
false
Architecture:
arm
Packer:
UPX
Botnet:
205.185.115.80:80/bins
Number of open files:
0
Number of processes launched:
0
Processes remaning?
false
Remote TCP ports scanned:
not identified
Behaviour
no suspicious findings
Botnet C2s
TCP botnet C2(s):
not identified
UDP botnet C2(s):
not identified
Result
Verdict:
MALICIOUS
Result
Threat name:
Detection:
malicious
Classification:
troj.evad
Score:
96 / 100
Signature
Antivirus / Scanner detection for submitted sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Sample is packed with UPX
Uses known network protocols on non-standard ports
Yara detected Mirai
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1303381 Sample: sora.arm.elf Startdate: 05/09/2023 Architecture: LINUX Score: 96 42 202.74.169.191, 23 ZETTAGRID-ASZETTAGRIDCLOUDAU Australia 2->42 44 156.122.87.99 XNSTGCA United States 2->44 46 98 other IPs or domains 2->46 48 Malicious sample detected (through community Yara rule) 2->48 50 Antivirus / Scanner detection for submitted sample 2->50 52 Multi AV Scanner detection for submitted file 2->52 54 3 other signatures 2->54 10 sora.arm.elf 2->10         started        signatures3 process4 process5 12 sora.arm.elf 10->12         started        14 sora.arm.elf 10->14         started        16 sora.arm.elf 10->16         started        process6 18 sora.arm.elf 12->18         started        20 sora.arm.elf 12->20         started        22 sora.arm.elf 14->22         started        24 sora.arm.elf 14->24         started        26 sora.arm.elf 14->26         started        process7 28 sora.arm.elf 18->28         started        30 sora.arm.elf 18->30         started        32 sora.arm.elf 18->32         started        34 sora.arm.elf 22->34         started        36 sora.arm.elf 22->36         started        process8 38 sora.arm.elf 28->38         started        40 sora.arm.elf 28->40         started       
Threat name:
Linux.Trojan.Mirai
Status:
Malicious
First seen:
2023-08-28 05:40:55 UTC
File Type:
ELF32 Little (Exe)
AV detection:
26 of 38 (68.42%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
upx
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

elf 3a22c5730cfc5279e2214d547fc6b56e9f23810631892e7d98189e731af22dc5

(this sample)

  
Delivery method
Distributed via web download

Comments