MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 3e19f41459be122a0669035294bfe2fbb347bec96a41b7dc1574c199e50af693. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 11


Intelligence 11 IOCs YARA File information Comments

SHA256 hash: 3e19f41459be122a0669035294bfe2fbb347bec96a41b7dc1574c199e50af693
SHA3-384 hash: 00b801d526fab5c9ab6c2c6200c337294f39d146539f043597176404fb667ab1f901a4a3bc6ad85bc799cb57a0adb9d0
SHA1 hash: f21044422de993d91198626f1cda7288d2b23b2f
MD5 hash: b3c0b4fbf083e4a1959cb6f6c0e474f6
humanhash: blue-aspen-seventeen-princess
File name:miori.ppc
Download: download sample
Signature Mirai
File size:35'092 bytes
First seen:2025-01-07 13:26:46 UTC
Last seen:Never
File type: elf
MIME type:application/x-executable
ssdeep 768:9b17JcDNqlFYZ5BTF/pkH2TwzH8S+uzaao8n:RsN0yRpu6kcyzFhn
TLSH T122F2F741732D0943C1B22EB0353B2BE1E7AFFA9121E4E289760F9B49C472E375546D8D
Magika elf
Reporter abuse_ch
Tags:elf mirai

Intelligence


File Origin
# of uploads :
1
# of downloads :
151
Origin country :
DE DE
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Connection attempt
Runs as daemon
Kills processes
Receives data from a server
Opens a port
Sends data to a server
Substitutes an application name
Kills critical processes
Performs a bruteforce attack in the network
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
android anti-debug masquerade mirai
Result
Threat name:
n/a
Detection:
malicious
Classification:
spre
Score:
52 / 100
Signature
Multi AV Scanner detection for submitted file
Sample tries to kill multiple processes (SIGKILL)
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1585327 Sample: miori.ppc.elf Startdate: 07/01/2025 Architecture: LINUX Score: 52 25 212.165.112.9 XANTIC-IPNL Netherlands 2->25 27 24.96.247.122, 23 WOW-INTERNETUS United States 2->27 29 98 other IPs or domains 2->29 33 Multi AV Scanner detection for submitted file 2->33 8 miori.ppc.elf 2->8         started        10 gnome-session-binary sh gsd-print-notifications 2->10         started        12 xfce4-session rm 2->12         started        signatures3 process4 process5 14 miori.ppc.elf 8->14         started        16 gsd-print-notifications 10->16         started        process6 18 miori.ppc.elf 14->18         started        21 miori.ppc.elf 14->21         started        23 gsd-print-notifications gsd-printer 16->23         started        signatures7 31 Sample tries to kill multiple processes (SIGKILL) 18->31
Threat name:
Linux.Trojan.Mirai
Status:
Malicious
First seen:
2025-01-07 09:06:12 UTC
File Type:
ELF32 Big (Exe)
AV detection:
17 of 24 (70.83%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  1/10
Tags:
linux
Verdict:
Malicious
Tags:
Unix.Trojan.Mirai-9940367-0
YARA:
n/a
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

elf 3e19f41459be122a0669035294bfe2fbb347bec96a41b7dc1574c199e50af693

(this sample)

  
Delivery method
Distributed via web download

Comments