MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 4ae515f6edaeb5a85ba227ff378681e9d56bfa66e1907accc3a102f0d345f83a. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 7


Intelligence 7 IOCs YARA 6 File information Comments

SHA256 hash: 4ae515f6edaeb5a85ba227ff378681e9d56bfa66e1907accc3a102f0d345f83a
SHA3-384 hash: 6e6543eb7cf6f87f7b37267b9bc402494a133b39541cb438e7fcae8a825b8f5b4953b0ba7f926502edd6fe0d255d0756
SHA1 hash: 8f6acec292564b71f567da8f9fd1c34110dabc13
MD5 hash: 5c1bd2f78b97fc923c45ebf819cb0455
humanhash: batman-wisconsin-uncle-shade
File name:main_ppc
Download: download sample
Signature Mirai
File size:138'132 bytes
First seen:2026-02-18 20:19:41 UTC
Last seen:Never
File type: elf
MIME type:application/x-executable
ssdeep 1536:bz94fQVaghEZmTA1FboAExfTIoEPtn2n+Y7bQ4znvAbj00WulzNsq1GcsywJ4:bzZEIE1poAEx7Et27k4kbt3T
TLSH T175D33B06731C0A47D2633EB43A3F27E193EFDA8121E4F644255FAB8A9171E321586EDD
Magika elf
Reporter abuse_ch
Tags:elf mirai

Intelligence


File Origin
# of uploads :
1
# of downloads :
118
Origin country :
DE DE
Vendor Threat Intelligence
Malware configuration found for:
Mirai
Details
Mirai
an XOR decryption key and at least a c2 socket address
Status:
terminated
Behavior Graph:
%3 guuid=ae4db299-1a00-0000-0ce1-68fa8c0a0000 pid=2700 /usr/bin/sudo guuid=ddc4f79b-1a00-0000-0ce1-68fa920a0000 pid=2706 /tmp/sample.bin guuid=ae4db299-1a00-0000-0ce1-68fa8c0a0000 pid=2700->guuid=ddc4f79b-1a00-0000-0ce1-68fa920a0000 pid=2706 execve
Threat name:
Linux.Worm.Mirai
Status:
Malicious
First seen:
2026-02-18 21:18:28 UTC
AV detection:
12 of 24 (50.00%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  1/10
Tags:
linux
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:botnet_Yakuza
Author:NDA0E
Description:Yakuza botnet
Rule name:ELF_Mirai
Author:NDA0E
Description:Detects multiple Mirai variants
Rule name:ELF_Toriilike_persist
Author:4r4
Description:Detects Torii IoT Botnet (stealthier Mirai alternative)
Reference:Identified via researched data
Rule name:linux_generic_ipv6_catcher
Author:@_lubiedo
Description:ELF samples using IPv6 addresses
Rule name:Linux_Trojan_Gafgyt_ea92cca8
Author:Elastic Security
Rule name:unixredflags3
Author:Tim Brown @timb_machine
Description:Hunts for UNIX red flags

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

elf 4ae515f6edaeb5a85ba227ff378681e9d56bfa66e1907accc3a102f0d345f83a

(this sample)

  
Delivery method
Distributed via web download

Comments