MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 530a352304116db57afe95d71d8eaf4abdccfc71f32feafb0f93b39d104ca149. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 10


Intelligence 10 IOCs YARA File information Comments

SHA256 hash: 530a352304116db57afe95d71d8eaf4abdccfc71f32feafb0f93b39d104ca149
SHA3-384 hash: cbb7d52d95b1190e298e73663313e6a59db5dff45db1419d99e7a9542e1a0a6954a8ba0bf1b038584fe27418aa80b8ee
SHA1 hash: 6ec19e4faad292df5b36d69f47d874d7c4efd5f9
MD5 hash: 5859da4b2e414a8b3a1bfab5f6bcd251
humanhash: mango-pizza-delaware-apart
File name:sparc
Download: download sample
Signature Mirai
File size:40'180 bytes
First seen:2025-12-19 12:09:14 UTC
Last seen:Never
File type: elf
MIME type:application/x-executable
ssdeep 768:gL+oOq9s8nL1IWSSZNfW2Z/VtlO+uqy7wgu7l:gKnSsm1IWSSZNfJZVtluqwW
TLSH T15A033A31BA7A1E17C4D0E87962F34729B2F5064E29A8CA1D3E720E4EFF15948B1076B4
Magika elf
Reporter abuse_ch
Tags:elf mirai

Intelligence


File Origin
# of uploads :
1
# of downloads :
89
Origin country :
DE DE
Vendor Threat Intelligence
Malware configuration found for:
Mirai
Details
Mirai
an XOR decryption key and at least a c2 socket address
Verdict:
Malicious
File Type:
elf.32.be
First seen:
2025-12-19T09:13:00Z UTC
Last seen:
2025-12-19T12:48:00Z UTC
Hits:
~10
Detections:
HEUR:Backdoor.Linux.Mirai.b
Status:
terminated
Behavior Graph:
%3 guuid=4af1abef-2000-0000-2b13-b07df80a0000 pid=2808 /usr/bin/sudo guuid=9d1b50f2-2000-0000-2b13-b07dfc0a0000 pid=2812 /tmp/sample.bin guuid=4af1abef-2000-0000-2b13-b07df80a0000 pid=2808->guuid=9d1b50f2-2000-0000-2b13-b07dfc0a0000 pid=2812 execve
Result
Threat name:
Detection:
malicious
Classification:
troj.evad
Score:
60 / 100
Signature
Multi AV Scanner detection for submitted file
Sample deletes itself
Yara detected Moobot
Behaviour
Behavior Graph:
Threat name:
Linux.Worm.Mirai
Status:
Malicious
First seen:
2025-12-19 12:10:41 UTC
File Type:
ELF32 Big (Exe)
AV detection:
14 of 24 (58.33%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:mirai linux
Malware Config
C2 Extraction:
park.cyberium.cc
hoon.cyberium.cc
Verdict:
Malicious
Tags:
Unix.Dropper.Mirai-7540663-0
YARA:
n/a
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

elf 530a352304116db57afe95d71d8eaf4abdccfc71f32feafb0f93b39d104ca149

(this sample)

  
Delivery method
Distributed via web download

Comments