MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 5cdd4aed0e360a981f25b0971bcdaba7297250b7a7f32f7764a69f400f88b323. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 6


Intelligence 6 IOCs YARA 8 File information Comments

SHA256 hash: 5cdd4aed0e360a981f25b0971bcdaba7297250b7a7f32f7764a69f400f88b323
SHA3-384 hash: c423b7cd7d1d79448e174e1c255fbfdf216df7e0b744921340e4d3aada6a07ea56c20deb1686bef07ecf3fcf2f7d9d1a
SHA1 hash: ae86509789c8620372932f064b59f23bb18cd336
MD5 hash: 324f097f698b363ccc599275115d958c
humanhash: mirror-sink-pizza-artist
File name:x86_64
Download: download sample
Signature Mirai
File size:47'328 bytes
First seen:2026-03-05 18:20:21 UTC
Last seen:Never
File type: elf
MIME type:application/x-executable
ssdeep 768:5gplhuslrXelfl66UBsnCixj8BJMj8eu299I3rXSL1XI2OJi3UnUkYIlV:klhuslrXelfl66UBsnCixj8Bpeu88jSy
TLSH T1F1234A032592D1FCCD6FC3F4176AB972E13B713D0135A64A5BECFE211F4AD601A6A648
telfhash t1e81102a139691ee0b0d7f6767799d1940e380e2511d035d3d9b0bdf99e20b510ab5c3b
TrID 50.1% (.) ELF Executable and Linkable format (Linux) (4022/12)
49.8% (.O) ELF Executable and Linkable format (generic) (4000/1)
Magika elf
Reporter abuse_ch
Tags:elf mirai

Intelligence


File Origin
# of uploads :
1
# of downloads :
89
Origin country :
DE DE
Vendor Threat Intelligence
No detections
Status:
terminated
Behavior Graph:
%3 guuid=7203dcb4-1a00-0000-f773-be82ff090000 pid=2559 /usr/bin/sudo guuid=bdba0fb8-1a00-0000-f773-be82050a0000 pid=2565 /tmp/sample.bin net guuid=7203dcb4-1a00-0000-f773-be82ff090000 pid=2559->guuid=bdba0fb8-1a00-0000-f773-be82050a0000 pid=2565 execve 8b0a01dc-0728-52c1-8024-c4ba7801b8d6 8.8.8.8:53 guuid=bdba0fb8-1a00-0000-f773-be82050a0000 pid=2565->8b0a01dc-0728-52c1-8024-c4ba7801b8d6 con guuid=c5c84bb8-1a00-0000-f773-be82070a0000 pid=2567 /tmp/sample.bin zombie guuid=bdba0fb8-1a00-0000-f773-be82050a0000 pid=2565->guuid=c5c84bb8-1a00-0000-f773-be82070a0000 pid=2567 clone guuid=6c5855b8-1a00-0000-f773-be82080a0000 pid=2568 /tmp/sample.bin net send-data zombie guuid=c5c84bb8-1a00-0000-f773-be82070a0000 pid=2567->guuid=6c5855b8-1a00-0000-f773-be82080a0000 pid=2568 clone 85a3407c-d285-5992-be4a-bfc61012adc4 130.12.180.171:5683 guuid=6c5855b8-1a00-0000-f773-be82080a0000 pid=2568->85a3407c-d285-5992-be4a-bfc61012adc4 send: 156B guuid=14f15fb8-1a00-0000-f773-be82090a0000 pid=2569 /usr/bin/dash guuid=6c5855b8-1a00-0000-f773-be82080a0000 pid=2568->guuid=14f15fb8-1a00-0000-f773-be82090a0000 pid=2569 execve guuid=73e1adb9-1a00-0000-f773-be820e0a0000 pid=2574 /usr/bin/dash guuid=6c5855b8-1a00-0000-f773-be82080a0000 pid=2568->guuid=73e1adb9-1a00-0000-f773-be820e0a0000 pid=2574 execve guuid=fd99c6b8-1a00-0000-f773-be820b0a0000 pid=2571 /usr/bin/mkdir guuid=14f15fb8-1a00-0000-f773-be82090a0000 pid=2569->guuid=fd99c6b8-1a00-0000-f773-be820b0a0000 pid=2571 execve guuid=ac5ceab9-1a00-0000-f773-be82100a0000 pid=2576 /usr/bin/mv guuid=73e1adb9-1a00-0000-f773-be820e0a0000 pid=2574->guuid=ac5ceab9-1a00-0000-f773-be82100a0000 pid=2576 execve guuid=5db36aba-1a00-0000-f773-be82120a0000 pid=2578 /usr/bin/chmod guuid=73e1adb9-1a00-0000-f773-be820e0a0000 pid=2574->guuid=5db36aba-1a00-0000-f773-be82120a0000 pid=2578 execve
Result
Threat name:
n/a
Detection:
malicious
Classification:
n/a
Score:
56 / 100
Signature
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1879164 Sample: x86_64.elf Startdate: 05/03/2026 Architecture: LINUX Score: 56 26 130.12.180.171, 43768, 5683 DATAHOPDatahop-SixDegreesGB Canada 2->26 28 Malicious sample detected (through community Yara rule) 2->28 30 Multi AV Scanner detection for submitted file 2->30 10 x86_64.elf 2->10         started        signatures3 process4 process5 12 x86_64.elf 10->12         started        process6 14 x86_64.elf 12->14         started        process7 16 x86_64.elf sh 14->16         started        18 x86_64.elf sh 14->18         started        process8 20 sh mv 16->20         started        22 sh chmod 16->22         started        24 sh mkdir 18->24         started       
Gathering data
Result
Malware family:
n/a
Score:
  7/10
Tags:
defense_evasion discovery linux
Behaviour
Reads runtime system information
File and Directory Permissions Modification
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:ELF_Toriilike_persist
Author:4r4
Description:Detects Torii IoT Botnet (stealthier Mirai alternative)
Reference:Identified via researched data
Rule name:Linux_Trojan_Gafgyt_33b4111a
Author:Elastic Security
Rule name:Linux_Trojan_Gafgyt_620087b9
Author:Elastic Security
Rule name:Linux_Trojan_Gafgyt_807911a2
Author:Elastic Security
Rule name:Linux_Trojan_Gafgyt_9e9530a7
Author:Elastic Security
Rule name:Linux_Trojan_Gafgyt_d4227dbf
Author:Elastic Security
Rule name:Linux_Trojan_Gafgyt_d996d335
Author:Elastic Security
Rule name:Linux_Trojan_Mirai_e0cf29e2
Author:Elastic Security

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

elf 5cdd4aed0e360a981f25b0971bcdaba7297250b7a7f32f7764a69f400f88b323

(this sample)

  
Delivery method
Distributed via web download

Comments