MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 49e32586aebf741dd23c5594b4a989f63667fb10e0d29570116fa1b5e2bf4ab5. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: 49e32586aebf741dd23c5594b4a989f63667fb10e0d29570116fa1b5e2bf4ab5
SHA3-384 hash: 06a32458926fce95900e7b02c3c759691e53a9c306b42fa16c6ee15e6dcb97548fca4493181ac20541b49387d5e8c4c3
SHA1 hash: de769b6e11485600454d6269c97d043f5cb50e53
MD5 hash: 0b9ee603e42f8507c8136cd4f1456ecc
humanhash: kilo-fourteen-july-six
File name:mips
Download: download sample
Signature Mirai
File size:34'932 bytes
First seen:2025-08-18 18:48:47 UTC
Last seen:Never
File type: elf
MIME type:application/x-executable
ssdeep 768:nww1gldVFmBtO3rhM5HCPthvEiGMb768PGtQoT:H2JFYtKFGHkjpOQoT
TLSH T196F252497A229FEDF728873947B78B31A34827D227E1D684E15CD9041F7034E685FBA8
telfhash t16ff0302c153852f1d3c58d9e6bedff38e4a080e799761f378d50e6aaa631a428c01d3c
Magika elf
Reporter abuse_ch
Tags:elf mirai

Intelligence


File Origin
# of uploads :
1
# of downloads :
72
Origin country :
DE DE
Vendor Threat Intelligence
Result
Verdict:
Suspicious
Maliciousness:

Behaviour
Opens a port
Sends data to a server
Receives data from a server
Connection attempt
DNS request
Runs as daemon
Result
Threat name:
n/a
Detection:
malicious
Classification:
n/a
Score:
48 / 100
Signature
Multi AV Scanner detection for submitted file
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1759603 Sample: mips.elf Startdate: 18/08/2025 Architecture: LINUX Score: 48 22 169.254.169.254, 80 USDOSUS Reserved 2->22 24 conn.magicpacketlease.org 45.125.66.90, 23120, 56588, 56590 TELE-ASTeleAsiaLimitedHK Hong Kong 2->24 26 4 other IPs or domains 2->26 28 Multi AV Scanner detection for submitted file 2->28 8 mips.elf 2->8         started        10 dash rm 2->10         started        12 dash rm 2->12         started        14 python3.8 dpkg 2->14         started        signatures3 process4 process5 16 mips.elf 8->16         started        process6 18 mips.elf 16->18         started        20 mips.elf 16->20         started       
Threat name:
Linux.Worm.Mirai
Status:
Malicious
First seen:
2025-08-18 18:49:34 UTC
File Type:
ELF32 Big (Exe)
AV detection:
15 of 38 (39.47%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
discovery
Behaviour
System Network Configuration Discovery
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

elf 49e32586aebf741dd23c5594b4a989f63667fb10e0d29570116fa1b5e2bf4ab5

(this sample)

  
Delivery method
Distributed via web download

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_NXMissing Non-Executable Memory Protectioncritical
CHECK_PIEMissing Position-Independent Executable (PIE) Protectionhigh

Comments