MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 4c49538e6b41017edf30999cb67d0da94decd207370651fb2f5534411fe584eb. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 8


Intelligence 8 IOCs YARA File information Comments 1

SHA256 hash: 4c49538e6b41017edf30999cb67d0da94decd207370651fb2f5534411fe584eb
SHA3-384 hash: 0a38e08df7ef536e694414040c0427ce9171a7bee3998467f8d99276d517d848867722167840f1a42a0d70ae0f0ed84b
SHA1 hash: 2af30c1431a0561fbaa4cc7362c6528ff47ee963
MD5 hash: c3ac9dcaaedf4fc28692acb3607ada19
humanhash: mississippi-maryland-violet-nevada
File name:c3ac9dcaaedf4fc28692acb3607ada19
Download: download sample
Signature Mirai
File size:20'964 bytes
First seen:2022-07-03 15:40:34 UTC
Last seen:2022-07-03 19:23:12 UTC
File type: elf
MIME type:application/x-executable
ssdeep 384:foOmwhsP4EVm+jKmOWRbJRRlDn5W23V8BXGCQvadX0TBDw2/4hymdGUop5httW:foLP4EV95LlDncQV8NtP0TB0s3UozLQ
TLSH T1F192C072558E2E30C360FCB29A7184575B92137CC03A716710290B9EE7DA58F52FD9DB
TrID 50.1% (.) ELF Executable and Linkable format (Linux) (4022/12)
49.8% (.O) ELF Executable and Linkable format (generic) (4000/1)
Reporter zbetcheckin
Tags:32 arm elf mirai

Intelligence


File Origin
# of uploads :
4
# of downloads :
185
Origin country :
n/a
Vendor Threat Intelligence
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
anti-debug
Verdict:
Malicious
Uses P2P?:
false
Uses anti-vm?:
false
Architecture:
arm
Packer:
UPX
Botnet:
unknown
Number of open files:
0
Number of processes launched:
0
Processes remaning?
false
Remote TCP ports scanned:
not identified
Behaviour
no suspicious findings
Botnet C2s
TCP botnet C2(s):
not identified
UDP botnet C2(s):
not identified
Result
Verdict:
UNKNOWN
Result
Threat name:
Detection:
malicious
Classification:
troj.evad
Score:
60 / 100
Signature
Multi AV Scanner detection for submitted file
Sample is packed with UPX
Yara detected Mirai
Behaviour
Behavior Graph:
Threat name:
Linux.Trojan.Mirai
Status:
Malicious
First seen:
2022-07-03 15:41:06 UTC
File Type:
ELF32 Little (Exe)
AV detection:
18 of 26 (69.23%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  1/10
Tags:
linux
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

elf 4c49538e6b41017edf30999cb67d0da94decd207370651fb2f5534411fe584eb

(this sample)

  
Delivery method
Distributed via web download

Comments



Avatar
zbet commented on 2022-07-03 15:40:36 UTC

url : hxxp://62.197.136.92/shitnet/irc.arm5