MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 5606be15fca02f519a622de48f50ef5b64ac495300d78e2f96204fe83aee650d. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 12


Intelligence 12 IOCs YARA File information Comments

SHA256 hash: 5606be15fca02f519a622de48f50ef5b64ac495300d78e2f96204fe83aee650d
SHA3-384 hash: 966e22200f88a32ac112ebf58e28336c3b003dcf7d4bf6572a8851ae7f5fe1c3ffd3a4b4df3b0b4d7ca087f84f7a1de3
SHA1 hash: e8f11e14f04a948f584f61c1456a15415b6e457b
MD5 hash: c2125d5f1f01870cf4bdbff5d89841bc
humanhash: tango-harry-one-pasta
File name:mpsl
Download: download sample
Signature Mirai
File size:227'264 bytes
First seen:2025-11-30 06:02:17 UTC
Last seen:Never
File type: elf
MIME type:application/x-executable
ssdeep 3072:7hbrNE/b7iu1VqQM+K90awQ05YHU+QJ99AP:F4ikAQM/4cJw99
TLSH T19E24C606BB611EFBDCABCD3746E9170128CC540A22A93F367674DA28F50B65F4AD3C64
TrID 50.1% (.) ELF Executable and Linkable format (Linux) (4022/12)
49.8% (.O) ELF Executable and Linkable format (generic) (4000/1)
Magika elf
Reporter abuse_ch
Tags:elf mirai upx-dec


Avatar
abuse_ch
UPX decompressed file, sourced from SHA256 bcf738a4d6b2794b0c4e0b7e3b48bbef4b1cf9de55b811b751fc5936bfe45b1d
File size (compressed) :65'356 bytes
File size (de-compressed) :227'264 bytes
Format:linux/mipsel
Packed file: bcf738a4d6b2794b0c4e0b7e3b48bbef4b1cf9de55b811b751fc5936bfe45b1d

Intelligence


File Origin
# of uploads :
1
# of downloads :
55
Origin country :
NL NL
Vendor Threat Intelligence
Malware configuration found for:
Mirai
Details
Mirai
an XOR decryption key and at least a c2 socket address
Result
Verdict:
Malware
Maliciousness:

Behaviour
Connection attempt
Verdict:
Unknown
Threat level:
  2.5/10
Confidence:
100%
Tags:
mirai
Verdict:
Malicious
Uses P2P?:
false
Uses anti-vm?:
false
Architecture:
mips
Packer:
not packed
Botnet:
unknown
Number of open files:
7
Number of processes launched:
1
Processes remaning?
false
Remote TCP ports scanned:
not identified
Behaviour
no suspicious findings
Botnet C2s
TCP botnet C2(s):
not identified
UDP botnet C2(s):
not identified
Result
Gathering data
Verdict:
Malicious
File Type:
elf.32.le
Detections:
HEUR:Backdoor.Linux.Mirai.b
Result
Threat name:
n/a
Detection:
malicious
Classification:
n/a
Score:
48 / 100
Signature
Multi AV Scanner detection for submitted file
Behaviour
Behavior Graph:
Threat name:
Linux.Worm.Mirai
Status:
Malicious
First seen:
2025-11-30 06:03:15 UTC
File Type:
ELF32 Little (Exe)
AV detection:
8 of 36 (22.22%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:mirai
Verdict:
Malicious
Tags:
Unix.Trojan.Mirai-10017641-0
YARA:
n/a
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

elf 5606be15fca02f519a622de48f50ef5b64ac495300d78e2f96204fe83aee650d

(this sample)

  
Delivery method
Distributed via web download

Comments