MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 3f3de74bad319ad5c64e54a97cd13474921eb83be0a5746d5cfe9fab040f30e4. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 9


Intelligence 9 IOCs YARA File information Comments 1

SHA256 hash: 3f3de74bad319ad5c64e54a97cd13474921eb83be0a5746d5cfe9fab040f30e4
SHA3-384 hash: 15f7d448215b2fc1b3409e3837962293b50926126afa2ae736147a3535abcda63331e70bfc859bcb363b39e21eb81380
SHA1 hash: a56c69e7f23927722eaa2c6f8bec17024ded93df
MD5 hash: 46d95b8ca9bcdca250f368fb4435735e
humanhash: louisiana-neptune-georgia-floor
File name:46d95b8ca9bcdca250f368fb4435735e
Download: download sample
Signature Mirai
File size:18'488 bytes
First seen:2023-04-28 23:05:25 UTC
Last seen:Never
File type: elf
MIME type:application/x-executable
ssdeep 384:MjlzRV0P6iOwrkom0DRnVATuSlShu6NvmPWtUn+KMaDqhymdGUop5h5lf:6/V0P6+kom0tVAoNvm+to1Gs3Uoznlf
TLSH T1AD82CF3061AB74E4DBF10430FAEE8EC697160BB8D1FC37E31658AB78C94610221F92C6
TrID 50.1% (.) ELF Executable and Linkable format (Linux) (4022/12)
49.8% (.O) ELF Executable and Linkable format (generic) (4000/1)
Reporter zbetcheckin
Tags:32 arm elf mirai

Intelligence


File Origin
# of uploads :
1
# of downloads :
159
Origin country :
FR FR
Vendor Threat Intelligence
Verdict:
No Threat
Threat level:
  10/10
Confidence:
100%
Tags:
anti-debug
Verdict:
Malicious
Uses P2P?:
false
Uses anti-vm?:
false
Architecture:
arm
Packer:
UPX
Botnet:
unknown
Number of open files:
0
Number of processes launched:
0
Processes remaning?
false
Remote TCP ports scanned:
not identified
Behaviour
no suspicious findings
Botnet C2s
TCP botnet C2(s):
not identified
UDP botnet C2(s):
not identified
Result
Verdict:
UNKNOWN
Result
Threat name:
Detection:
malicious
Classification:
troj.evad
Score:
68 / 100
Signature
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Sample is packed with UPX
Yara detected Mirai
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 856242 Sample: 0RwldeEy0l.elf Startdate: 29/04/2023 Architecture: LINUX Score: 68 39 109.202.202.202, 80 INIT7CH Switzerland 2->39 41 91.189.91.42, 443 CANONICAL-ASGB United Kingdom 2->41 43 91.189.91.43, 443 CANONICAL-ASGB United Kingdom 2->43 45 Malicious sample detected (through community Yara rule) 2->45 47 Multi AV Scanner detection for submitted file 2->47 49 Yara detected Mirai 2->49 51 Sample is packed with UPX 2->51 9 systemd logrotate 2->9         started        11 systemd mandb 0RwldeEy0l.elf 2->11         started        13 systemd install 2->13         started        15 systemd find 2->15         started        signatures3 process4 process5 17 logrotate sh 9->17         started        19 logrotate sh 9->19         started        21 logrotate gzip 9->21         started        23 logrotate gzip 9->23         started        process6 25 sh invoke-rc.d 17->25         started        27 sh rsyslog-rotate 19->27         started        process7 29 invoke-rc.d runlevel 25->29         started        31 invoke-rc.d systemctl 25->31         started        33 invoke-rc.d ls 25->33         started        35 invoke-rc.d systemctl 25->35         started        37 rsyslog-rotate systemctl 27->37         started       
Threat name:
Linux.Trojan.Mirai
Status:
Malicious
First seen:
2023-04-28 23:06:06 UTC
File Type:
ELF32 Little (Exe)
AV detection:
19 of 24 (79.17%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
upx
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

elf 3f3de74bad319ad5c64e54a97cd13474921eb83be0a5746d5cfe9fab040f30e4

(this sample)

  
Delivery method
Distributed via web download

Comments



Avatar
zbet commented on 2023-04-28 23:05:29 UTC

url : hxxp://194.15.36.24/hiddenbin/boatnet.arm5