MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 3ecda2a7a6d13bafea629c41b5b8a35d8e129d873db178d17e1c69adc48a7540. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 6


Intelligence 6 IOCs YARA 5 File information Comments

SHA256 hash: 3ecda2a7a6d13bafea629c41b5b8a35d8e129d873db178d17e1c69adc48a7540
SHA3-384 hash: 2389a2b2a04f5642283d59f5ae086dccd3fb88da614e332db7867ca1b29398edf8523badc42b5fda13642f4788d44dba
SHA1 hash: f86daac441c5c6d069c9f56f123bc0dfc1b04b30
MD5 hash: 72f020e529f680c390fe6883d773f0b6
humanhash: beryllium-oranges-oklahoma-texas
File name:epshteyn_m68k
Download: download sample
Signature Mirai
File size:160'812 bytes
First seen:2026-02-16 09:58:48 UTC
Last seen:2026-02-16 20:01:07 UTC
File type: elf
MIME type:application/x-executable
ssdeep 3072:ALaf08MRvOfeQMVynG87N7kSfBRDEEF0WRdgVsjbi+LDk+AN:AMbcynF7N7kgRhZRdrLDiN
TLSH T1E3F339C7F900DDFAF80EE7378853081AB130BBA255425A777257752BED3A1990437E8A
Magika elf
Reporter juroots
Tags:elf mirai

Intelligence


File Origin
# of uploads :
2
# of downloads :
96
Origin country :
CH CH
Vendor Threat Intelligence
No detections
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
anti-vm anti-vm bash expand lolbin
Status:
terminated
Behavior Graph:
%3 guuid=031845bb-1a00-0000-1a0c-b89cb80b0000 pid=3000 /usr/bin/sudo guuid=6c6823bd-1a00-0000-1a0c-b89cbe0b0000 pid=3006 /tmp/sample.bin guuid=031845bb-1a00-0000-1a0c-b89cb80b0000 pid=3000->guuid=6c6823bd-1a00-0000-1a0c-b89cbe0b0000 pid=3006 execve
Threat name:
Linux.Worm.Mirai
Status:
Malicious
First seen:
2026-02-16 09:59:39 UTC
File Type:
ELF32 Big (Exe)
AV detection:
5 of 35 (14.29%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  1/10
Tags:
linux
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:ELF_Mirai
Author:NDA0E
Description:Detects multiple Mirai variants
Rule name:ELF_Toriilike_persist
Author:4r4
Description:Detects Torii IoT Botnet (stealthier Mirai alternative)
Reference:Identified via researched data
Rule name:telebot_framework
Author:vietdx.mb
Rule name:unixredflags3
Author:Tim Brown @timb_machine
Description:Hunts for UNIX red flags
Rule name:vmdetect
Author:nex
Description:Possibly employs anti-virtualization techniques

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

elf 3ecda2a7a6d13bafea629c41b5b8a35d8e129d873db178d17e1c69adc48a7540

(this sample)

  
Delivery method
Distributed via web download

Comments