MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 6335958f87009f0c085150fbfc91707439a9e127d561afc44c8c5a69a76077e8. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 8


Intelligence 8 IOCs YARA File information Comments

SHA256 hash: 6335958f87009f0c085150fbfc91707439a9e127d561afc44c8c5a69a76077e8
SHA3-384 hash: 9241a5c579315ff56d294a29392467324b8940884a5374f05ac37de6c5ec79d80b28d913d83e0ea5be99bfa255f98692
SHA1 hash: 50ae7bb4ee33d390b809cba6566dc2dbbcf030fc
MD5 hash: 000e97ad2f9895f3b505ea4e5b8c3cd7
humanhash: hamper-nine-michigan-papa
File name:Owari.mips
Download: download sample
Signature Mirai
File size:68'804 bytes
First seen:2026-02-07 14:27:59 UTC
Last seen:Never
File type: elf
MIME type:application/x-executable
ssdeep 1536:2VVUIa+SzL6P1rNVHV0vaEfKOYFRhOJmuE79ywo8eFpV:2VqIfVBNf0STDhO5PPHrV
TLSH T1C163971A3E219FBDFBAC863887B78E20965833D616F1C584D15CED015E7038E645FB98
telfhash t1a7016268453802f0d3804ecd7bddef3ae49140df99222e378e40eaa7aa257455c01c2c
Magika elf
Reporter abuse_ch
Tags:elf mirai

Intelligence


File Origin
# of uploads :
1
# of downloads :
29
Origin country :
DE DE
Vendor Threat Intelligence
Malware configuration found for:
Mirai
Details
Mirai
an XOR decryption key and at least a c2 socket address
Verdict:
Unknown
Threat level:
  0/10
Confidence:
100%
Tags:
masquerade
Result
Gathering data
Result
Threat name:
n/a
Detection:
malicious
Classification:
spre
Score:
60 / 100
Signature
Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Sample tries to kill multiple processes (SIGKILL)
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1865271 Sample: Owari.mips.elf Startdate: 07/02/2026 Architecture: LINUX Score: 60 25 197.190.238.246, 23 zain-asGH Ghana 2->25 27 184.165.207.121 YAHOO-1US United States 2->27 29 99 other IPs or domains 2->29 31 Antivirus / Scanner detection for submitted sample 2->31 33 Multi AV Scanner detection for submitted file 2->33 8 Owari.mips.elf 2->8         started        10 python3.8 dpkg 2->10         started        signatures3 process4 process5 12 Owari.mips.elf 8->12         started        15 Owari.mips.elf 8->15         started        17 Owari.mips.elf 8->17         started        signatures6 35 Sample tries to kill multiple processes (SIGKILL) 12->35 19 Owari.mips.elf 15->19         started        21 Owari.mips.elf 15->21         started        23 Owari.mips.elf 15->23         started        process7
Gathering data
Result
Malware family:
Score:
  10/10
Tags:
family:mirai botnet:owari defense_evasion discovery
Behaviour
Reads runtime system information
System Network Configuration Discovery
Changes its process name
Reads system network configuration
Enumerates active TCP sockets
Modifies Watchdog functionality
Contacts a large (88938) amount of remote hosts
Creates a large amount of network flows
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

elf 6335958f87009f0c085150fbfc91707439a9e127d561afc44c8c5a69a76077e8

(this sample)

  
Delivery method
Distributed via web download

Comments