MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 53ae423125c6fd4f48f6c1330bcd056c3f038bb35ef6b0c6d539ab87c5f0e8e6. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 9


Intelligence 9 IOCs YARA File information Comments

SHA256 hash: 53ae423125c6fd4f48f6c1330bcd056c3f038bb35ef6b0c6d539ab87c5f0e8e6
SHA3-384 hash: 43f90b5b86d0c1942ef60a09e0a122aea39ff2e17a15b66e3931219a0a6d29a3d9a4b61a07a5c5d2d64ca342df75252c
SHA1 hash: e268196715780362e76f067c610fae40700490a7
MD5 hash: acf3d3968da8324b31646459528080f6
humanhash: three-twenty-ten-xray
File name:boatnet.spc
Download: download sample
Signature Mirai
File size:54'184 bytes
First seen:2026-01-30 15:08:40 UTC
Last seen:Never
File type: elf
MIME type:application/x-executable
ssdeep 768:GVoh3lDBFm6t+deWU3xwIZotohqJvM+AEMO+VziNx1:GVItBF4de33xwIZotYXVW1
TLSH T192334A21F9791A27C0D4B1BA12FB832AB1F6479F50A8C74D7D320E8EFF1499059A75B0
Magika elf
Reporter abuse_ch
Tags:elf mirai

Intelligence


File Origin
# of uploads :
1
# of downloads :
52
Origin country :
DE DE
Vendor Threat Intelligence
Malware configuration found for:
Mirai
Details
Mirai
an XOR decryption key and at least a c2 socket address
Verdict:
Unknown
Threat level:
  0/10
Confidence:
100%
Tags:
masquerade
Result
Gathering data
Verdict:
Malicious
File Type:
elf.32.be
First seen:
2026-01-30T08:05:00Z UTC
Last seen:
2026-01-30T10:17:00Z UTC
Hits:
~10
Detections:
HEUR:Backdoor.Linux.Mirai.b
Status:
terminated
Behavior Graph:
%3 guuid=a617423b-1900-0000-6c40-70ac6b070000 pid=1899 /usr/bin/sudo guuid=e3ee023e-1900-0000-6c40-70ac71070000 pid=1905 /tmp/sample.bin guuid=a617423b-1900-0000-6c40-70ac6b070000 pid=1899->guuid=e3ee023e-1900-0000-6c40-70ac71070000 pid=1905 execve
Result
Threat name:
n/a
Detection:
malicious
Classification:
spre
Score:
60 / 100
Signature
Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Sample tries to kill multiple processes (SIGKILL)
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1860578 Sample: boatnet.spc.elf Startdate: 30/01/2026 Architecture: LINUX Score: 60 22 45.137.98.97, 3778, 43788 AS43260TR Lithuania 2->22 24 daisy.ubuntu.com 2->24 26 Antivirus / Scanner detection for submitted sample 2->26 28 Multi AV Scanner detection for submitted file 2->28 7 boatnet.spc.elf 2->7         started        9 xfce4-panel wrapper-2.0 2->9         started        11 xfce4-panel wrapper-2.0 2->11         started        13 5 other processes 2->13 signatures3 process4 process5 15 boatnet.spc.elf 7->15         started        18 boatnet.spc.elf 7->18         started        20 boatnet.spc.elf 7->20         started        signatures6 30 Sample tries to kill multiple processes (SIGKILL) 15->30
Gathering data
Result
Malware family:
Score:
  10/10
Tags:
family:mirai botnet:lzrd linux
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

elf 53ae423125c6fd4f48f6c1330bcd056c3f038bb35ef6b0c6d539ab87c5f0e8e6

(this sample)

  
Delivery method
Distributed via web download

Comments