MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 4df6a7792aaca12a85a161b700d46a5dd0149cbcffe6fd4db1b745c5340fa50c. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 10


Intelligence 10 IOCs YARA File information Comments

SHA256 hash: 4df6a7792aaca12a85a161b700d46a5dd0149cbcffe6fd4db1b745c5340fa50c
SHA3-384 hash: 682bc1b037162cbb2b106e13cd3e3c155e50cb775d7c7ae67e79860a896148b70eb4c846549c6a2881d9d35228b30543
SHA1 hash: 012276749df5340109057166fd4ae5d8ce065d0a
MD5 hash: 5c65edb4cede8f33d41217bd761589b9
humanhash: item-bakerloo-fourteen-berlin
File name:TRC.spc
Download: download sample
Signature Mirai
File size:51'124 bytes
First seen:2025-11-10 16:21:26 UTC
Last seen:2025-11-11 02:21:03 UTC
File type: elf
MIME type:application/x-executable
ssdeep 768:Ncu2oSxq9wiNZmPScYRXdgPIeBzUT82EtO+vDIw:eu2FxSwiNZmPSnRXdgQen2EdN
TLSH T189332A21793A2F17C0D4A47A62F74758B2F11A5E66E8CA5EBC730E4FFF60940A4136B4
Magika elf
Reporter abuse_ch
Tags:elf mirai

Intelligence


File Origin
# of uploads :
3
# of downloads :
147
Origin country :
DE DE
Vendor Threat Intelligence
Gathering data
Verdict:
Malicious
File Type:
elf.32.be
First seen:
2025-11-10T13:41:00Z UTC
Last seen:
2025-11-11T10:18:00Z UTC
Hits:
~10
Detections:
HEUR:Backdoor.Linux.Mirai.b HEUR:Backdoor.Linux.Mirai.ba
Status:
terminated
Behavior Graph:
%3 guuid=e08005ad-1e00-0000-e99d-ad79a00b0000 pid=2976 /usr/bin/sudo guuid=43e5efaf-1e00-0000-e99d-ad79a90b0000 pid=2985 /tmp/sample.bin guuid=e08005ad-1e00-0000-e99d-ad79a00b0000 pid=2976->guuid=43e5efaf-1e00-0000-e99d-ad79a90b0000 pid=2985 execve
Result
Threat name:
n/a
Detection:
malicious
Classification:
spre
Score:
60 / 100
Signature
Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Sample tries to kill multiple processes (SIGKILL)
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1811510 Sample: TRC.spc.elf Startdate: 10/11/2025 Architecture: LINUX Score: 60 33 103.163.118.111, 13, 48110, 48112 AARNET-AS-APAustralianAcademicandResearchNetworkAARNe unknown 2->33 37 Antivirus / Scanner detection for submitted sample 2->37 39 Multi AV Scanner detection for submitted file 2->39 10 TRC.spc.elf 2->10         started        signatures3 process4 process5 12 TRC.spc.elf 10->12         started        14 TRC.spc.elf 10->14         started        16 TRC.spc.elf 10->16         started        process6 18 TRC.spc.elf 12->18         started        21 TRC.spc.elf 12->21         started        23 TRC.spc.elf 14->23         started        25 TRC.spc.elf 14->25         started        signatures7 35 Sample tries to kill multiple processes (SIGKILL) 18->35 27 TRC.spc.elf 23->27         started        29 TRC.spc.elf 23->29         started        process8 process9 31 TRC.spc.elf 27->31         started       
Threat name:
Linux.Worm.Mirai
Status:
Malicious
First seen:
2025-11-10 16:18:33 UTC
File Type:
ELF32 Big (Exe)
AV detection:
23 of 36 (63.89%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:mirai botnet:owari linux
Verdict:
Malicious
Tags:
Unix.Dropper.Mirai-7135890-0
YARA:
n/a
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

elf 4df6a7792aaca12a85a161b700d46a5dd0149cbcffe6fd4db1b745c5340fa50c

(this sample)

  
Delivery method
Distributed via web download

Comments