MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 657f928d11168996b3a16c400e4c37903ef1cec1fee7c7dca7fe08cb764d778d. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 12


Intelligence 12 IOCs YARA File information Comments 1

SHA256 hash: 657f928d11168996b3a16c400e4c37903ef1cec1fee7c7dca7fe08cb764d778d
SHA3-384 hash: d747f7148394bbeaf6ba7e03811b30a611aae41a85b1f0588ef7ab6732a2176ea3b9f899548e0862251778cdbb65eb25
SHA1 hash: 46fb8e4d7e52a4000f5a08d9b2221654d7675106
MD5 hash: b207af79248d7417e189157e0e3f1f44
humanhash: butter-tennessee-seven-hawaii
File name:b207af79248d7417e189157e0e3f1f44
Download: download sample
Signature Mirai
File size:1'456 bytes
First seen:2024-11-08 05:31:48 UTC
Last seen:2024-11-08 08:36:02 UTC
File type: elf
MIME type:application/x-executable
ssdeep 24:lpKGpa7Urz/jlfBCAXK1hH9Vev3gRGaJ9iM3BBuDCWlxrR+zP6eF0:lpKGpa7UrLZB4I+JhBumWlxrsPLF
TLSH T15131F191A3D05E78CCE491BEEE5643507374AF40E0C7726296086758BD29E7C9D26046
telfhash t1ff9002264f1f88509650020c84e50651c8d4d2530a0068d4499d0e0085529107464240
TrID 50.1% (.) ELF Executable and Linkable format (Linux) (4022/12)
49.8% (.O) ELF Executable and Linkable format (generic) (4000/1)
Magika elf
Reporter zbetcheckin
Tags:32 arm elf mirai

Intelligence


File Origin
# of uploads :
3
# of downloads :
97
Origin country :
FR FR
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Sends data to a server
Connection attempt
Receives data from a server
Creating a file
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
anti-debug
Verdict:
Malicious
Uses P2P?:
false
Uses anti-vm?:
false
Architecture:
arm
Packer:
not packed
Botnet:
unknown
Number of open files:
0
Number of processes launched:
0
Processes remaning?
false
Remote TCP ports scanned:
not identified
Behaviour
no suspicious findings
Botnet C2s
TCP botnet C2(s):
not identified
UDP botnet C2(s):
not identified
Result
Verdict:
MALICIOUS
Result
Threat name:
Mirai, Okiru
Detection:
malicious
Classification:
troj
Score:
88 / 100
Signature
Antivirus detection for dropped file
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected Mirai
Yara detected Okiru
Behaviour
Behavior Graph:
Threat name:
Linux.Backdoor.Mirai
Status:
Malicious
First seen:
2024-11-08 05:32:07 UTC
File Type:
ELF32 Little (Exe)
AV detection:
17 of 38 (44.74%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:mirai botnet:lzrd botnet
Behaviour
Writes file to tmp directory
Mirai
Mirai family
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

elf 657f928d11168996b3a16c400e4c37903ef1cec1fee7c7dca7fe08cb764d778d

(this sample)

  
Delivery method
Distributed via web download

Comments



Avatar
zbet commented on 2024-11-08 05:31:49 UTC

url : hxxp://154.216.16.94/dlr/dlr.arm6