MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 5b6ea279d9b3515d2d2badf4dc524034f3150dadbc3eba6e6557e80cdab7fb94. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 11


Intelligence 11 IOCs YARA 2 File information Comments

SHA256 hash: 5b6ea279d9b3515d2d2badf4dc524034f3150dadbc3eba6e6557e80cdab7fb94
SHA3-384 hash: a261557022dac88a35bf99716927392182d99fd60668e9f6d2e39588e12e61d7b1e56aa53ebcd57f2c32fa96e3080acb
SHA1 hash: 8f48430d1f030201d018acbb53a8a014fd3bd024
MD5 hash: 9b526cd1ccaca59d7d58bb9d1079caad
humanhash: mexico-orange-bacon-steak
File name:boatnet.x86
Download: download sample
Signature Mirai
File size:26'780 bytes
First seen:2026-02-13 12:46:00 UTC
Last seen:Never
File type: elf
MIME type:application/x-executable
ssdeep 384:M1MPUNXmohVnU+bq6M9KnH567qO5CJGGqNMGjyYiysY1AFslILf8pvhn9v1Ri:UMQXThVn0917qeovGmA1AFv0Jhpi
TLSH T190C2E126FA245E7EF097523F59898E9228573E04B90E656F3B8A0BCF91E11741F18DC8
TrID 50.1% (.) ELF Executable and Linkable format (Linux) (4022/12)
49.8% (.O) ELF Executable and Linkable format (generic) (4000/1)
Magika elf
Reporter abuse_ch
Tags:elf mirai UPX
File size (compressed) :26'780 bytes
File size (de-compressed) :54'928 bytes
Format:linux/i386
Unpacked file: 8d062306c81466cc4d312207e6d56797edd8676246ab020f95171a72181af762

Intelligence


File Origin
# of uploads :
1
# of downloads :
40
Origin country :
DE DE
Vendor Threat Intelligence
Verdict:
Malicious
Uses P2P?:
false
Uses anti-vm?:
false
Architecture:
x86
Packer:
UPX
Botnet:
unknown
Number of open files:
1
Number of processes launched:
4
Processes remaning?
false
Remote TCP ports scanned:
not identified
Behaviour
no suspicious findings
Botnet C2s
TCP botnet C2(s):
type:Mirai 43.228.157.33:3778
UDP botnet C2(s):
not identified
Verdict:
Malicious
File Type:
elf.32.le
First seen:
2026-02-12T20:00:00Z UTC
Last seen:
2026-02-13T12:59:00Z UTC
Hits:
~10
Detections:
HEUR:Backdoor.Linux.Mirai.h HEUR:Backdoor.Linux.Mirai.b
Status:
terminated
Behavior Graph:
%3 guuid=fedf0984-1a00-0000-43cd-f85652050000 pid=1362 /usr/bin/sudo guuid=b30d8f86-1a00-0000-43cd-f85659050000 pid=1369 /tmp/sample.bin net guuid=fedf0984-1a00-0000-43cd-f85652050000 pid=1362->guuid=b30d8f86-1a00-0000-43cd-f85659050000 pid=1369 execve 8b0a01dc-0728-52c1-8024-c4ba7801b8d6 8.8.8.8:53 guuid=b30d8f86-1a00-0000-43cd-f85659050000 pid=1369->8b0a01dc-0728-52c1-8024-c4ba7801b8d6 con guuid=ce1add86-1a00-0000-43cd-f8565a050000 pid=1370 /tmp/sample.bin zombie guuid=b30d8f86-1a00-0000-43cd-f85659050000 pid=1369->guuid=ce1add86-1a00-0000-43cd-f8565a050000 pid=1370 clone guuid=578de686-1a00-0000-43cd-f8565b050000 pid=1371 /tmp/sample.bin guuid=b30d8f86-1a00-0000-43cd-f85659050000 pid=1369->guuid=578de686-1a00-0000-43cd-f8565b050000 pid=1371 clone guuid=ffebe986-1a00-0000-43cd-f8565c050000 pid=1372 /tmp/sample.bin net send-data zombie guuid=b30d8f86-1a00-0000-43cd-f85659050000 pid=1369->guuid=ffebe986-1a00-0000-43cd-f8565c050000 pid=1372 clone guuid=ffebe986-1a00-0000-43cd-f8565c050000 pid=1372->8b0a01dc-0728-52c1-8024-c4ba7801b8d6 con 4cb80022-4760-59c2-95e9-38ac0dadeecd 43.228.157.33:3778 guuid=ffebe986-1a00-0000-43cd-f8565c050000 pid=1372->4cb80022-4760-59c2-95e9-38ac0dadeecd send: 5B
Threat name:
Linux.Worm.Mirai
Status:
Malicious
First seen:
2026-02-13 00:06:20 UTC
File Type:
ELF32 Little (Exe)
AV detection:
17 of 24 (70.83%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:mirai botnet:lzrd botnet defense_evasion discovery linux upx
Behaviour
Reads runtime system information
Enumerates running processes
Writes file to system bin folder
Modifies Watchdog functionality
Mirai
Mirai family
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:linux_generic_ipv6_catcher
Author:@_lubiedo
Description:ELF samples using IPv6 addresses
Rule name:upx_packed_elf_v1
Author:RandomMalware

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments