MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 6c1415b3b42f22a42d606b1124386dbaba15239ce97e7270bfc01077d873ed9e. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 12


Intelligence 12 IOCs YARA File information Comments

SHA256 hash: 6c1415b3b42f22a42d606b1124386dbaba15239ce97e7270bfc01077d873ed9e
SHA3-384 hash: afeabf0df56f913aae89fb311d3b094fc69788231d6359024c9860a477bc5e14374cf1c5b4ce9a187bae96c476df59e6
SHA1 hash: 18e006a1221442420dcc82eb5b19f77c5f033786
MD5 hash: fda598aef75b92613a6e4b360e694e54
humanhash: seventeen-yankee-maryland-saturn
File name:Josho.spc
Download: download sample
Signature Mirai
File size:60'116 bytes
First seen:2025-12-23 22:57:19 UTC
Last seen:2025-12-24 09:02:20 UTC
File type: elf
MIME type:application/x-executable
ssdeep 768:TXon00+q9wp3C+vactfa1sDHQYAzsv6WswWSHoXdss63B/9JO+zC3b:TXw00+SY3CaactfI6Qvzsv6vwcGJg
TLSH T1C2432925AD792E26C0D4B57A51F78714F2F2220E26B8C61E3CB21E4EFF04B4065577BA
Magika elf
Reporter abuse_ch
Tags:elf mirai

Intelligence


File Origin
# of uploads :
3
# of downloads :
70
Origin country :
DE DE
Vendor Threat Intelligence
Malware configuration found for:
Mirai
Details
Mirai
an XOR decryption key and at least a c2 socket address
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
gafgyt masquerade mirai
Result
Gathering data
Verdict:
Malicious
File Type:
elf.32.be
Detections:
HEUR:Backdoor.Linux.Mirai.ba HEUR:Backdoor.Linux.Mirai.b
Status:
terminated
Behavior Graph:
%3 guuid=4a134898-1900-0000-5d18-e36e380c0000 pid=3128 /usr/bin/sudo guuid=4a00089b-1900-0000-5d18-e36e410c0000 pid=3137 /tmp/sample.bin guuid=4a134898-1900-0000-5d18-e36e380c0000 pid=3128->guuid=4a00089b-1900-0000-5d18-e36e410c0000 pid=3137 execve
Result
Threat name:
n/a
Detection:
malicious
Classification:
spre
Score:
60 / 100
Signature
Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Sample tries to kill multiple processes (SIGKILL)
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1838543 Sample: Josho.spc.elf Startdate: 24/12/2025 Architecture: LINUX Score: 60 44 13.9.44.26 XEROX-WVUS United States 2->44 46 109.76.156.150, 23 VODAFONE-IRELAND-ASNIE Ireland 2->46 48 98 other IPs or domains 2->48 50 Antivirus / Scanner detection for submitted sample 2->50 52 Multi AV Scanner detection for submitted file 2->52 10 Josho.spc.elf 2->10         started        signatures3 process4 process5 12 Josho.spc.elf 10->12         started        15 Josho.spc.elf 10->15         started        17 Josho.spc.elf 10->17         started        signatures6 56 Sample tries to kill multiple processes (SIGKILL) 12->56 19 Josho.spc.elf 12->19         started        21 Josho.spc.elf 12->21         started        23 Josho.spc.elf 15->23         started        26 Josho.spc.elf 15->26         started        28 Josho.spc.elf 15->28         started        process7 signatures8 30 Josho.spc.elf 19->30         started        32 Josho.spc.elf 19->32         started        34 Josho.spc.elf 19->34         started        54 Sample tries to kill multiple processes (SIGKILL) 23->54 36 Josho.spc.elf 23->36         started        38 Josho.spc.elf 23->38         started        process9 process10 40 Josho.spc.elf 30->40         started        42 Josho.spc.elf 30->42         started       
Threat name:
Linux.Worm.Mirai
Status:
Malicious
First seen:
2025-12-23 13:34:40 UTC
File Type:
ELF32 Big (Exe)
AV detection:
23 of 36 (63.89%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:mirai botnet:josho linux
Verdict:
Malicious
Tags:
Unix.Dropper.Mirai-7135890-0
YARA:
n/a
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

elf 6c1415b3b42f22a42d606b1124386dbaba15239ce97e7270bfc01077d873ed9e

(this sample)

  
Delivery method
Distributed via web download

Comments