MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 61f29118945e4883ae802db3b79401f9c2d66075ad8337ce4bfe3216052eb8fe. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: 61f29118945e4883ae802db3b79401f9c2d66075ad8337ce4bfe3216052eb8fe
SHA3-384 hash: 0060b072a22bc9b81ec4c9064a7f40576460769d5c29e45c5147d2e7496f30faa338c949633e2fcc2a81d0fa90f4fee5
SHA1 hash: 99ff34ab6947e51eab5c7ae8868a01687395422e
MD5 hash: bf8e423db4d392ff02b6ab35bd3de7cc
humanhash: bulldog-johnny-summer-yankee
File name:dlr.mips
Download: download sample
Signature Mirai
File size:2'000 bytes
First seen:2025-12-19 12:09:13 UTC
Last seen:2025-12-19 14:18:35 UTC
File type: elf
MIME type:application/x-executable
ssdeep 24:3+Ydb5jl8AmslI3t8AmypR/z2HollP1YWB4u3GMI8paeudz3N9l5zBkEp7iBAGni:OG5E4GYg2HozheHeu/9LuEpgn39mBl
TLSH T19E4102C91F325EF9F05AD53887370B3937AE514847C04249E1ACDA406EC030E99DE7D9
TrID 50.1% (.) ELF Executable and Linkable format (Linux) (4022/12)
49.8% (.O) ELF Executable and Linkable format (generic) (4000/1)
Magika elf
Reporter abuse_ch
Tags:elf mirai

Intelligence


File Origin
# of uploads :
4
# of downloads :
72
Origin country :
DE DE
Vendor Threat Intelligence
No detections
Verdict:
Unknown
Threat level:
  0/10
Confidence:
100%
Tags:
masquerade
Verdict:
Malicious
File Type:
elf.32.be
First seen:
2025-12-19T09:57:00Z UTC
Last seen:
2025-12-19T12:48:00Z UTC
Hits:
~10
Status:
terminated
Behavior Graph:
%3 guuid=b8209212-1a00-0000-177a-ed519a090000 pid=2458 /usr/bin/sudo guuid=a5886015-1a00-0000-177a-ed51a2090000 pid=2466 /tmp/sample.bin guuid=b8209212-1a00-0000-177a-ed519a090000 pid=2458->guuid=a5886015-1a00-0000-177a-ed51a2090000 pid=2466 execve
Result
Threat name:
n/a
Detection:
malicious
Classification:
n/a
Score:
48 / 100
Signature
Multi AV Scanner detection for submitted file
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1836235 Sample: dlr.mips.elf Startdate: 19/12/2025 Architecture: LINUX Score: 48 12 94.156.152.67, 40266, 80 NET1-ASBG Bulgaria 2->12 14 109.202.202.202, 80 INIT7CH Switzerland 2->14 16 3 other IPs or domains 2->16 18 Multi AV Scanner detection for submitted file 2->18 6 dash rm 2->6         started        8 dash rm 2->8         started        10 dlr.mips.elf 2->10         started        signatures3 process4
Threat name:
Linux.Downloader.Mirai
Status:
Malicious
First seen:
2025-12-19 12:10:40 UTC
File Type:
ELF32 Big (Exe)
AV detection:
10 of 24 (41.67%)
Threat level:
  3/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
discovery
Behaviour
System Network Configuration Discovery
Writes file to tmp directory
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

elf 61f29118945e4883ae802db3b79401f9c2d66075ad8337ce4bfe3216052eb8fe

(this sample)

  
Delivery method
Distributed via web download

Comments