MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 49bb46a9666b22959fd771b385348086cb0c06dccc5d6b13b08a91610c4eaaae. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 10


Intelligence 10 IOCs YARA File information Comments

SHA256 hash: 49bb46a9666b22959fd771b385348086cb0c06dccc5d6b13b08a91610c4eaaae
SHA3-384 hash: f90f059e8f4bdc641b93adc5a630d529ba28d37cab517107a48e49822266352f7492ec7b348eca20efcef7107510fa82
SHA1 hash: be9ab731275d8f64b3b892646507f68656606892
MD5 hash: 29db70c9b1d74c2c21d92265e2e7102b
humanhash: oregon-eleven-white-mirror
File name:mpsl
Download: download sample
Signature Mirai
File size:109'540 bytes
First seen:2025-11-09 07:04:21 UTC
Last seen:Never
File type: elf
MIME type:application/x-executable
ssdeep 1536:Fecxi5xA6nk3gesQKjLdgqO1f9R7o+bxithTOCHZj5fGb:FyZk3iOqO1HXifpjlE
TLSH T106B3D646BFA11EFBDC5FCC3749E92706258C651A12B97F3A7534D928B60B20F4AD3860
TrID 50.1% (.) ELF Executable and Linkable format (Linux) (4022/12)
49.8% (.O) ELF Executable and Linkable format (generic) (4000/1)
Magika elf
Reporter abuse_ch
Tags:elf mirai upx-dec


Avatar
abuse_ch
UPX decompressed file, sourced from SHA256 f447ff198a6297219493ad2c64777ad8500961414fccac6980a7dcfced98f7e4
File size (compressed) :40'112 bytes
File size (de-compressed) :109'540 bytes
Format:linux/mipsel
Packed file: f447ff198a6297219493ad2c64777ad8500961414fccac6980a7dcfced98f7e4

Intelligence


File Origin
# of uploads :
1
# of downloads :
66
Origin country :
NL NL
Vendor Threat Intelligence
Result
Verdict:
Clean
Maliciousness:

Behaviour
Connection attempt
Verdict:
Unknown
Threat level:
  0/10
Confidence:
100%
Tags:
mirai
Verdict:
Malicious
Uses P2P?:
false
Uses anti-vm?:
false
Architecture:
mips
Packer:
not packed
Botnet:
unknown
Number of open files:
7
Number of processes launched:
1
Processes remaning?
false
Remote TCP ports scanned:
not identified
Behaviour
no suspicious findings
Botnet C2s
TCP botnet C2(s):
not identified
UDP botnet C2(s):
not identified
Verdict:
Malicious
File Type:
elf.32.le
First seen:
2025-11-09T04:14:00Z UTC
Last seen:
2025-11-09T04:47:00Z UTC
Hits:
~10
Detections:
HEUR:Backdoor.Linux.Mirai.b
Status:
terminated
Behavior Graph:
%3 guuid=ff39b18d-1900-0000-8c8d-d115d2080000 pid=2258 /usr/bin/sudo guuid=607f0490-1900-0000-8c8d-d115d3080000 pid=2259 /tmp/sample.bin guuid=ff39b18d-1900-0000-8c8d-d115d2080000 pid=2258->guuid=607f0490-1900-0000-8c8d-d115d3080000 pid=2259 execve
Gathering data
Result
Threat name:
n/a
Detection:
malicious
Classification:
n/a
Score:
48 / 100
Signature
Multi AV Scanner detection for submitted file
Behaviour
Behavior Graph:
Threat name:
Linux.Worm.Mirai
Status:
Malicious
First seen:
2025-11-09 07:05:30 UTC
File Type:
ELF32 Little (Exe)
AV detection:
14 of 24 (58.33%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:mirai
Verdict:
Malicious
Tags:
Unix.Trojan.Mirai-10017641-0
YARA:
n/a
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

elf 49bb46a9666b22959fd771b385348086cb0c06dccc5d6b13b08a91610c4eaaae

(this sample)

  
Delivery method
Distributed via web download

Comments