MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 68b68fab7fc4e87d2402e78758f9b841f1996b7cea8f4d7af017c26f1466566a. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 11


Intelligence 11 IOCs YARA 1 File information Comments

SHA256 hash: 68b68fab7fc4e87d2402e78758f9b841f1996b7cea8f4d7af017c26f1466566a
SHA3-384 hash: 7249dea20c4e32b69ee5480d70cc8980109f59f6379d4ae681e6089fcad3fb02b1f45ace052878b6b769f65de0207520
SHA1 hash: 6e93dff0f5c7ce9b86a5b084a9ebcc40d6642369
MD5 hash: f13b7cac15b4eccda71ca6fcb5d36874
humanhash: steak-california-crazy-alpha
File name:sdxkzX_UNXPOE282.mips
Download: download sample
Signature Mirai
File size:68'780 bytes
First seen:2026-02-02 18:26:41 UTC
Last seen:Never
File type: elf
MIME type:application/x-executable
ssdeep 1536:MY2u5HHN7kc3twv3w7tIfh2Ay8GKX/LBN/9p2:X2wj+Ny8GKvLj/r2
TLSH T1806384492E219FFCFF6D833547B78E259658239636D1C6C1E26CE9002E7034D641FBA9
telfhash t19a011958893813f0e7855edc6becff36e55140df99226e378e10ed9aeb25a469d00c2c
Magika elf
Reporter abuse_ch
Tags:elf mirai upx-dec


Avatar
abuse_ch
UPX decompressed file, sourced from SHA256 0d6d3ea1285fc46852fed1dcf7640874afc4c3d00debdcda7ca908c689a3e41b
File size (compressed) :25'712 bytes
File size (de-compressed) :68'780 bytes
Format:linux/mips
Packed file: 0d6d3ea1285fc46852fed1dcf7640874afc4c3d00debdcda7ca908c689a3e41b

Intelligence


File Origin
# of uploads :
1
# of downloads :
75
Origin country :
NL NL
Vendor Threat Intelligence
Malware configuration found for:
Mirai
Details
Mirai
an XOR decryption key and at least a c2 socket address
Result
Verdict:
Malware
Maliciousness:

Behaviour
Opens a port
Connection attempt
Traces processes
Verdict:
Unknown
Threat level:
  0/10
Confidence:
100%
Tags:
masquerade mirai
Verdict:
Malicious
Uses P2P?:
false
Uses anti-vm?:
false
Architecture:
mips
Packer:
not packed
Botnet:
unknown
Number of open files:
1
Number of processes launched:
6
Processes remaning?
true
Remote TCP ports scanned:
2323,23
Behaviour
Process Renaming
Anti-Debugging
Botnet C2s
TCP botnet C2(s):
not identified
UDP botnet C2(s):
not identified
Verdict:
Malicious
File Type:
elf.32.be
First seen:
2026-02-02T10:49:00Z UTC
Last seen:
2026-02-02T16:58:00Z UTC
Hits:
~10
Status:
terminated
Behavior Graph:
%3 guuid=8f2adad5-1800-0000-d6de-c57d240b0000 pid=2852 /usr/bin/sudo guuid=eea8a0d7-1800-0000-d6de-c57d2b0b0000 pid=2859 /tmp/sample.bin guuid=8f2adad5-1800-0000-d6de-c57d240b0000 pid=2852->guuid=eea8a0d7-1800-0000-d6de-c57d2b0b0000 pid=2859 execve
Result
Threat name:
Detection:
malicious
Classification:
troj
Score:
64 / 100
Signature
Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Yara detected Mirai
Behaviour
Behavior Graph:
Threat name:
Linux.Worm.Mirai
Status:
Malicious
First seen:
2026-02-02 17:37:53 UTC
File Type:
ELF32 Big (Exe)
AV detection:
24 of 37 (64.86%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:mirai discovery
Behaviour
System Network Configuration Discovery
Traces itself
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:linux_generic_ipv6_catcher
Author:@_lubiedo
Description:ELF samples using IPv6 addresses

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

elf 68b68fab7fc4e87d2402e78758f9b841f1996b7cea8f4d7af017c26f1466566a

(this sample)

  
Delivery method
Distributed via web download

Comments