MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 443b213c37993139b2a4cff5559c407711d10e208459991b57e60117e223f730. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 6


Intelligence 6 IOCs YARA 3 File information Comments 1

SHA256 hash: 443b213c37993139b2a4cff5559c407711d10e208459991b57e60117e223f730
SHA3-384 hash: 0ca5e859af77497f0456dbd9f49127b932171940f1095dec90b3f26cfa76ab06e1ad7bca726852150f8c76b4bbc53ac1
SHA1 hash: 1ebcb3a1e039f0260452fb499697be0ad14161aa
MD5 hash: 577ea1f5f05b2b4bafabc1e2e9b1d249
humanhash: shade-spring-pluto-october
File name:577ea1f5f05b2b4bafabc1e2e9b1d249
Download: download sample
Signature Mirai
File size:56'372 bytes
First seen:2021-09-29 18:58:58 UTC
Last seen:Never
File type: elf
MIME type:application/x-executable
ssdeep 768:5/B04NLq+zKb5QmwDGajzQFSwtY8Ue6sedM+UvkE2SlrRQmCl3oxdfrJCu/+:5/qQLZWlfajfwtYdeldTlrRzlxBJCu/
TLSH T19F43AF32C86D6ED4C25D4278A9349F3C2B13D504A6971EF24E9A8A924047FECF6493F6
Reporter zbetcheckin
Tags:32 elf mirai renesas

Intelligence


File Origin
# of uploads :
1
# of downloads :
134
Origin country :
n/a
Vendor Threat Intelligence
Result
Threat name:
Detection:
malicious
Classification:
spre.troj
Score:
68 / 100
Signature
Multi AV Scanner detection for submitted file
Sample tries to kill many processes (SIGKILL)
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Yara detected Mirai
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 493665 Sample: zCS6X4TGYb Startdate: 29/09/2021 Architecture: LINUX Score: 68 46 197.213.217.195 ZAIN-ZAMBIAZM Zambia 2->46 48 129.76.65.159 WN-WY-ASUS United States 2->48 50 98 other IPs or domains 2->50 54 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->54 56 Multi AV Scanner detection for submitted file 2->56 58 Yara detected Mirai 2->58 10 zCS6X4TGYb 2->10         started        12 systemd sshd 2->12         started        14 systemd sshd 2->14         started        16 4 other processes 2->16 signatures3 process4 process5 18 zCS6X4TGYb 10->18         started        21 zCS6X4TGYb 10->21         started        23 zCS6X4TGYb 10->23         started        signatures6 52 Sample tries to kill many processes (SIGKILL) 18->52 25 zCS6X4TGYb 18->25         started        27 zCS6X4TGYb 18->27         started        29 zCS6X4TGYb 21->29         started        32 zCS6X4TGYb 21->32         started        34 zCS6X4TGYb 21->34         started        process7 signatures8 36 zCS6X4TGYb 25->36         started        38 zCS6X4TGYb 25->38         started        40 zCS6X4TGYb 25->40         started        60 Sample tries to kill many processes (SIGKILL) 29->60 process9 process10 42 zCS6X4TGYb 36->42         started        44 zCS6X4TGYb 36->44         started       
Threat name:
Linux.Trojan.Mirai
Status:
Malicious
First seen:
2021-09-29 18:59:06 UTC
AV detection:
26 of 44 (59.09%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:mirai linux
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:linux_generic_ipv6_catcher
Author:@_lubiedo
Description:ELF samples using IPv6 addresses
Rule name:SUSP_XORed_Mozilla
Author:Florian Roth
Description:Detects suspicious XORed keyword - Mozilla/5.0
Reference:Internal Research
Rule name:SUSP_XORed_Mozilla_RID2DB4
Author:Florian Roth
Description:Detects suspicious XORed keyword - Mozilla/5.0
Reference:Internal Research

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

elf 443b213c37993139b2a4cff5559c407711d10e208459991b57e60117e223f730

(this sample)

  
Delivery method
Distributed via web download

Comments



Avatar
zbet commented on 2021-09-29 18:58:59 UTC

url : hxxp://195.133.18.148/webos/whoareyou.sh4