MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 5876d6880335c12251957c009433e924dc164d8e3845fbe95d1e87bf56142d0a. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: 5876d6880335c12251957c009433e924dc164d8e3845fbe95d1e87bf56142d0a
SHA3-384 hash: 1d5ab724853ca3e84fceccb45faee7c6f943fd0d660add5dd0da33bbc6d6b444eebb0dd5fa24c73ddb91b1e69f551370
SHA1 hash: b086e534e41dfb1c51bb26c9314d65a163eaa6fd
MD5 hash: 75ac57458d1f68bf82bf147289475280
humanhash: orange-spring-iowa-california
File name:arm5-20220501-2200
Download: download sample
Signature Mirai
File size:17'984 bytes
First seen:2022-05-01 22:00:08 UTC
Last seen:2022-05-04 10:31:56 UTC
File type: elf
MIME type:application/x-executable
ssdeep 384:KshkEUWvRzUAdST1bp4y6aQuMIHaQBnSQhymdGUop5huU3:5vBhdSn4ytgKSQs3UozMU3
TLSH T1F882C064339A9972C370803DAE8CC4C593736EACD1E771B3945403B434AB5469DF8997
TrID 50.1% (.) ELF Executable and Linkable format (Linux) (4022/12)
49.8% (.O) ELF Executable and Linkable format (generic) (4000/1)
Reporter tolisec
Tags:mirai

Intelligence


File Origin
# of uploads :
10
# of downloads :
255
Origin country :
n/a
Vendor Threat Intelligence
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
anti-debug
Verdict:
Malicious
Uses P2P?:
false
Uses anti-vm?:
false
Architecture:
arm
Packer:
UPX
Botnet:
194.31.98.171
Number of open files:
0
Number of processes launched:
0
Processes remaning?
false
Remote TCP ports scanned:
not identified
Behaviour
no suspicious findings
Botnet C2s
TCP botnet C2(s):
not identified
UDP botnet C2(s):
not identified
Result
Verdict:
UNKNOWN
Result
Threat name:
Unknown
Detection:
malicious
Classification:
evad
Score:
52 / 100
Signature
Multi AV Scanner detection for submitted file
Sample is packed with UPX
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 618720 Sample: arm5-20220501-2200 Startdate: 02/05/2022 Architecture: LINUX Score: 52 39 189.203.139.74, 23, 44334 TOTALPLAYTELECOMUNICACIONESSADECVMX Mexico 2->39 41 109.202.202.202, 80 INIT7CH Switzerland 2->41 43 6 other IPs or domains 2->43 45 Multi AV Scanner detection for submitted file 2->45 47 Sample is packed with UPX 2->47 9 systemd logrotate 2->9         started        11 systemd mandb arm5-20220501-2200 2->11         started        13 systemd install 2->13         started        15 2 other processes 2->15 signatures3 process4 process5 17 logrotate sh 9->17         started        19 logrotate sh 9->19         started        21 logrotate gzip 9->21         started        23 logrotate gzip 9->23         started        process6 25 sh invoke-rc.d 17->25         started        27 sh rsyslog-rotate 19->27         started        process7 29 invoke-rc.d runlevel 25->29         started        31 invoke-rc.d systemctl 25->31         started        33 invoke-rc.d ls 25->33         started        35 invoke-rc.d systemctl 25->35         started        37 rsyslog-rotate systemctl 27->37         started       
Threat name:
Linux.Trojan.Mirai
Status:
Malicious
First seen:
2022-05-01 19:27:13 UTC
File Type:
ELF32 Little (Exe)
AV detection:
16 of 26 (61.54%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  1/10
Tags:
linux
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

elf 5876d6880335c12251957c009433e924dc164d8e3845fbe95d1e87bf56142d0a

(this sample)

  
Delivery method
Distributed via web download

Comments