MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 6aaf6c22e9c9c200c1265b83b56d4f9bf86ce0e4905430c6ce619f0712be9d60. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 7


Intelligence 7 IOCs YARA 2 File information Comments

SHA256 hash: 6aaf6c22e9c9c200c1265b83b56d4f9bf86ce0e4905430c6ce619f0712be9d60
SHA3-384 hash: 2801cc404fa359172e9b5b1acc192d387825ae367d4620c31f9e233cdcc120101e9a9d391e66736d43c7a33662a2598d
SHA1 hash: 94dd45989528362e563ae1aa1348add15d5f7e59
MD5 hash: 654e89191c69ad44944ff5174b10b91e
humanhash: jersey-diet-ohio-iowa
File name:spc
Download: download sample
Signature Mirai
File size:94'632 bytes
First seen:2025-03-06 15:01:48 UTC
Last seen:Never
File type: elf
MIME type:application/x-executable
ssdeep 1536:64cGm3H+S5o0PzJZGX5D0VKhOz/TzUUiG2PYU4I0pj7tQo3po+55uBHryytHHMm:WpOQN8vUbk0p76o5oIuBHryeHMm
TLSH T1E69339267A7A1D1BC4D4947A21E34372F2F5934624BCC92B7D711E8DBF606903227BB4
Magika elf
Reporter abuse_ch
Tags:elf mirai

Intelligence


File Origin
# of uploads :
1
# of downloads :
98
Origin country :
DE DE
Vendor Threat Intelligence
Result
Verdict:
UNKNOWN
Result
Threat name:
Detection:
malicious
Classification:
troj
Score:
68 / 100
Signature
Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Sample reads /proc/mounts (often used for finding a writable filesystem)
Yara detected Mirai
Behaviour
Behavior Graph:
Threat name:
Linux.Trojan.Mirai
Status:
Malicious
First seen:
2025-03-06 02:27:25 UTC
File Type:
ELF32 Big (Exe)
AV detection:
14 of 24 (58.33%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  1/10
Tags:
linux
Verdict:
Malicious
Tags:
Unix.Trojan.Mirai-9885259-0
YARA:
n/a
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:ach_202503_elf_Mirai
Author:abuse.ch
Description:Detects Mirai 'TSource' ELF files
Rule name:unixredflags3
Author:Tim Brown @timb_machine
Description:Hunts for UNIX red flags

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

elf 6aaf6c22e9c9c200c1265b83b56d4f9bf86ce0e4905430c6ce619f0712be9d60

(this sample)

  
Delivery method
Distributed via web download

Comments