MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 54d4ac8209ac5e13a980cb6a57383f140c92fb69e52c797e7d887e139306438a. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 10


Intelligence 10 IOCs YARA File information Comments

SHA256 hash: 54d4ac8209ac5e13a980cb6a57383f140c92fb69e52c797e7d887e139306438a
SHA3-384 hash: 1075eb4a762a4c439ad861610e67598b0743464f078f49178d8b57aab2473ee25d7458f58c7368d603f5ebea5489b226
SHA1 hash: 67e2f72a0cb0c6f3ad6b91b8393d6c3abeec3a6d
MD5 hash: 0a87aa79733acbecc0d0a5d395eabce9
humanhash: fish-social-seven-shade
File name:Josho.mpsl
Download: download sample
Signature Mirai
File size:71'528 bytes
First seen:2025-12-23 22:59:25 UTC
Last seen:Never
File type: elf
MIME type:application/x-executable
ssdeep 768:QxNCJ0EYlDYhHnZwqsFDwLX3U6ngBhN6PNUpGXS5SyeweVKe0n3oNWpkmPqXitMF:QxNCJBYl3FwwjhwPTXSNxIKzn6CpC
TLSH T17763A506BF214FF7DCAFDD3749A91B05259C640B21A97B397E34D828F64A24F19E3860
TrID 50.1% (.) ELF Executable and Linkable format (Linux) (4022/12)
49.8% (.O) ELF Executable and Linkable format (generic) (4000/1)
Magika elf
Reporter abuse_ch
Tags:elf mirai

Intelligence


File Origin
# of uploads :
1
# of downloads :
55
Origin country :
DE DE
Vendor Threat Intelligence
Malware configuration found for:
Mirai
Details
Mirai
an XOR decryption key and at least a c2 socket address
Result
Gathering data
Status:
terminated
Behavior Graph:
%3 guuid=3d4aa52a-1c00-0000-9831-f5081e0c0000 pid=3102 /usr/bin/sudo guuid=6652b22c-1c00-0000-9831-f508260c0000 pid=3110 /tmp/sample.bin guuid=3d4aa52a-1c00-0000-9831-f5081e0c0000 pid=3102->guuid=6652b22c-1c00-0000-9831-f508260c0000 pid=3110 execve
Result
Threat name:
n/a
Detection:
malicious
Classification:
spre
Score:
60 / 100
Signature
Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Sample tries to kill multiple processes (SIGKILL)
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1838540 Sample: Josho.mpsl.elf Startdate: 24/12/2025 Architecture: LINUX Score: 60 24 155.183.159.118, 23 ZAMRENZM United States 2->24 26 89.18.154.43 WIPLINE-ASRU Russian Federation 2->26 28 98 other IPs or domains 2->28 32 Antivirus / Scanner detection for submitted sample 2->32 34 Multi AV Scanner detection for submitted file 2->34 8 Josho.mpsl.elf 2->8         started        signatures3 process4 process5 10 Josho.mpsl.elf 8->10         started        12 Josho.mpsl.elf 8->12         started        15 Josho.mpsl.elf 8->15         started        signatures6 17 Josho.mpsl.elf 10->17         started        20 Josho.mpsl.elf 10->20         started        22 Josho.mpsl.elf 10->22         started        36 Sample tries to kill multiple processes (SIGKILL) 12->36 process7 signatures8 30 Sample tries to kill multiple processes (SIGKILL) 17->30
Threat name:
Linux.Worm.Mirai
Status:
Malicious
First seen:
2025-12-23 13:53:47 UTC
File Type:
ELF32 Little (Exe)
AV detection:
25 of 36 (69.44%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:mirai botnet:josho defense_evasion discovery
Behaviour
Reads runtime system information
Changes its process name
Reads system network configuration
Enumerates active TCP sockets
Enumerates running processes
Modifies Watchdog functionality
Contacts a large (48703) amount of remote hosts
Creates a large amount of network flows
Verdict:
Malicious
Tags:
Unix.Dropper.Mirai-7135890-0
YARA:
n/a
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

elf 54d4ac8209ac5e13a980cb6a57383f140c92fb69e52c797e7d887e139306438a

(this sample)

  
Delivery method
Distributed via web download

Comments