MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 4a9dd166b7defdfef9779389dde9590f8e5b1883dca32afd7a313763ed4b75d3. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 11


Intelligence 11 IOCs YARA File information Comments

SHA256 hash: 4a9dd166b7defdfef9779389dde9590f8e5b1883dca32afd7a313763ed4b75d3
SHA3-384 hash: 896b01060544f7f11adf4875e289eb132fbfafd7b807de1f2afdefe24fbb19d9df3e2377c75c7152a41069f33f988207
SHA1 hash: 0fb84892bda4c07cc91cc7d99e22f92148812b92
MD5 hash: 682f88b50d87eead61fbb51b20c9390f
humanhash: artist-winner-undress-carbon
File name:ppc
Download: download sample
Signature Mirai
File size:158'388 bytes
First seen:2025-05-23 14:23:36 UTC
Last seen:Never
File type: elf
MIME type:application/x-executable
ssdeep 1536:+87fkJ1aUrn1NY1JhmcfQVKs/RxEkFp3qRtmvSickCNsp+ZlVEI4vATmrp81Up/N:lEaUA1rmKWxbF8WvrCNS+rNTf7u
TLSH T1C2F34B02731C0D47D2632EF0363F27E093EFEA5125E4F645695FAA599232E321586ECE
Magika elf
Reporter abuse_ch
Tags:elf mirai

Intelligence


File Origin
# of uploads :
1
# of downloads :
67
Origin country :
DE DE
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Connection attempt
Runs as daemon
Opens a port
Receives data from a server
Sends data to a server
Substitutes an application name
Performs a bruteforce attack in the network
Verdict:
Unknown
Threat level:
  0/10
Confidence:
100%
Tags:
lolbin remote
Result
Threat name:
Detection:
malicious
Classification:
troj
Score:
64 / 100
Signature
Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Yara detected Mirai
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1697855 Sample: ppc.elf Startdate: 23/05/2025 Architecture: LINUX Score: 64 24 50.43.113.51 ZIPLY-FIBER-LEGACY-ASNUS United States 2->24 26 45.214.228.53 ZAIN-ZAMBIAZM Zambia 2->26 28 98 other IPs or domains 2->28 30 Antivirus / Scanner detection for submitted sample 2->30 32 Multi AV Scanner detection for submitted file 2->32 34 Yara detected Mirai 2->34 8 dash rm ppc.elf 2->8         started        10 dash rm 2->10         started        12 dash cut 2->12         started        14 7 other processes 2->14 signatures3 process4 process5 16 ppc.elf 8->16         started        18 ppc.elf 8->18         started        process6 20 ppc.elf 16->20         started        22 ppc.elf 16->22         started       
Threat name:
Linux.Worm.Mirai
Status:
Malicious
First seen:
2025-05-23 14:25:51 UTC
File Type:
ELF32 Big (Exe)
AV detection:
17 of 24 (70.83%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:mirai botnet:kurc linux
Verdict:
Malicious
Tags:
Unix.Dropper.Mirai-7135870-0
YARA:
n/a
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

elf 4a9dd166b7defdfef9779389dde9590f8e5b1883dca32afd7a313763ed4b75d3

(this sample)

  
Delivery method
Distributed via web download

Comments