MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 6d2cc0cbed11e7ae15f75926c5b89c0c144a41db4987ee2e8c4db2bebeff2944. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 12


Intelligence 12 IOCs YARA 13 File information Comments

SHA256 hash: 6d2cc0cbed11e7ae15f75926c5b89c0c144a41db4987ee2e8c4db2bebeff2944
SHA3-384 hash: b3ac062f4dd38ae5971140ff5054fa98901a3bea19bb0b39b76e12a1e7af20cff97819c82a0f7c6caba881ad76a0ca40
SHA1 hash: aad425f74a70d959f40df0bd41a73bbed006036d
MD5 hash: 80610f6eb611e6dae0188084fe83bf59
humanhash: zulu-kentucky-skylark-triple
File name:x86
Download: download sample
Signature Mirai
File size:104'748 bytes
First seen:2025-09-07 02:40:35 UTC
Last seen:Never
File type: elf
MIME type:application/x-executable
ssdeep 3072:jorRrPqU48xmKixs4EYSrxF3cSJ4jOVY8kTjs:jotryU48xmKixmFro6LkTj
TLSH T133A35AC0F643D4F2E85705715137E7339B32E9394029EA46D379AD36AC52A42DB1B3AC
telfhash t1895105f71e7e0ce8a7d4a401d35e6f512d5ee67b25a032a104b3593423a7ec241bec39
TrID 50.1% (.) ELF Executable and Linkable format (Linux) (4022/12)
49.8% (.O) ELF Executable and Linkable format (generic) (4000/1)
Magika elf
Reporter abuse_ch
Tags:elf Hailbot mirai

Intelligence


File Origin
# of uploads :
1
# of downloads :
43
Origin country :
DE DE
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Receives data from a server
Opens a port
DNS request
Runs as daemon
Creating a file
Sends data to a server
Connection attempt
Substitutes an application name
Verdict:
Unknown
Threat level:
  0/10
Confidence:
100%
Tags:
anti-vm
Verdict:
Malicious
Uses P2P?:
false
Uses anti-vm?:
false
Architecture:
x86
Packer:
not packed
Botnet:
unknown
Number of open files:
4
Number of processes launched:
6
Processes remaning?
true
Remote TCP ports scanned:
not identified
Behaviour
Process Renaming
Botnet C2s
TCP botnet C2(s):
not identified
UDP botnet C2(s):
not identified
Verdict:
Malicious
File Type:
elf.32.le
First seen:
2025-09-06T23:50:00Z UTC
Last seen:
2025-09-06T23:50:00Z UTC
Hits:
~10
Detections:
HEUR:Backdoor.Linux.Mirai.gen HEUR:Backdoor.Linux.Mirai.hj
Status:
terminated
Behavior Graph:
%3 guuid=53b15f85-1600-0000-f96d-2a0c880c0000 pid=3208 /usr/bin/sudo guuid=777b4c88-1600-0000-f96d-2a0c8d0c0000 pid=3213 /tmp/sample.bin guuid=53b15f85-1600-0000-f96d-2a0c880c0000 pid=3208->guuid=777b4c88-1600-0000-f96d-2a0c8d0c0000 pid=3213 execve guuid=6ee07f88-1600-0000-f96d-2a0c8f0c0000 pid=3215 /home/sandbox/ guuid=777b4c88-1600-0000-f96d-2a0c8d0c0000 pid=3213->guuid=6ee07f88-1600-0000-f96d-2a0c8f0c0000 pid=3215 clone guuid=49890189-1600-0000-f96d-2a0c900c0000 pid=3216 /home/sandbox/ guuid=777b4c88-1600-0000-f96d-2a0c8d0c0000 pid=3213->guuid=49890189-1600-0000-f96d-2a0c900c0000 pid=3216 clone guuid=d5e31389-1600-0000-f96d-2a0c910c0000 pid=3217 /home/sandbox/ zombie guuid=777b4c88-1600-0000-f96d-2a0c8d0c0000 pid=3213->guuid=d5e31389-1600-0000-f96d-2a0c910c0000 pid=3217 clone guuid=68561789-1600-0000-f96d-2a0c920c0000 pid=3218 /home/sandbox/ dns net send-data zombie guuid=777b4c88-1600-0000-f96d-2a0c8d0c0000 pid=3213->guuid=68561789-1600-0000-f96d-2a0c920c0000 pid=3218 clone c0b60401-2787-5e57-85f9-7652823a4a8e 70.34.254.19:53 guuid=68561789-1600-0000-f96d-2a0c920c0000 pid=3218->c0b60401-2787-5e57-85f9-7652823a4a8e send: 26B 290f2f6d-9b03-5a51-9b59-33627a07e20d 137.220.52.23:53 guuid=68561789-1600-0000-f96d-2a0c920c0000 pid=3218->290f2f6d-9b03-5a51-9b59-33627a07e20d send: 26B 997a677b-e2e3-587d-b712-9bb3900e9b02 51.158.108.203:53 guuid=68561789-1600-0000-f96d-2a0c920c0000 pid=3218->997a677b-e2e3-587d-b712-9bb3900e9b02 send: 26B 64586b8d-c26f-57bd-82e8-22697bee65dd mdw7.xyz:4687 guuid=68561789-1600-0000-f96d-2a0c920c0000 pid=3218->64586b8d-c26f-57bd-82e8-22697bee65dd send: 11B guuid=21a1b906-1a00-0000-f96d-2a0c1b0e0000 pid=3611 /home/sandbox/ send-data guuid=68561789-1600-0000-f96d-2a0c920c0000 pid=3218->guuid=21a1b906-1a00-0000-f96d-2a0c1b0e0000 pid=3611 clone guuid=99647b4f-1c00-0000-f96d-2a0c1c0e0000 pid=3612 /home/sandbox/ send-data guuid=68561789-1600-0000-f96d-2a0c920c0000 pid=3218->guuid=99647b4f-1c00-0000-f96d-2a0c1c0e0000 pid=3612 clone guuid=92b908eb-1d00-0000-f96d-2a0c1d0e0000 pid=3613 /home/sandbox/ send-data guuid=68561789-1600-0000-f96d-2a0c920c0000 pid=3218->guuid=92b908eb-1d00-0000-f96d-2a0c1d0e0000 pid=3613 clone guuid=dac6086e-2000-0000-f96d-2a0c1e0e0000 pid=3614 /home/sandbox/ net send-data guuid=68561789-1600-0000-f96d-2a0c920c0000 pid=3218->guuid=dac6086e-2000-0000-f96d-2a0c1e0e0000 pid=3614 clone cde8ee8e-ac30-519f-bab4-81c61aa379e6 mdw7.xyz:22 guuid=21a1b906-1a00-0000-f96d-2a0c1b0e0000 pid=3611->cde8ee8e-ac30-519f-bab4-81c61aa379e6 send: 1104B guuid=99647b4f-1c00-0000-f96d-2a0c1c0e0000 pid=3612->cde8ee8e-ac30-519f-bab4-81c61aa379e6 send: 2208B guuid=92b908eb-1d00-0000-f96d-2a0c1d0e0000 pid=3613->cde8ee8e-ac30-519f-bab4-81c61aa379e6 send: 552B 16a4711e-993e-502c-b60a-d9561028550b mdw7.xyz:53 guuid=dac6086e-2000-0000-f96d-2a0c1e0e0000 pid=3614->16a4711e-993e-502c-b60a-d9561028550b send: 85B
Result
Threat name:
n/a
Detection:
malicious
Classification:
troj
Score:
72 / 100
Signature
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Performs DNS queries to domains with low reputation
Sample reads /proc/mounts (often used for finding a writable filesystem)
Suricata IDS alerts for network traffic
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1772518 Sample: x86.elf Startdate: 07/09/2025 Architecture: LINUX Score: 72 24 mdw7.xyz 2->24 26 mdw7.xyz 195.96.129.57, 1907, 47948 UTA-ASAT unknown 2->26 28 4 other IPs or domains 2->28 30 Suricata IDS alerts for network traffic 2->30 32 Malicious sample detected (through community Yara rule) 2->32 34 Multi AV Scanner detection for submitted file 2->34 7 dash rm x86.elf 2->7         started        9 dash rm 2->9         started        11 dash cat 2->11         started        13 8 other processes 2->13 signatures3 36 Performs DNS queries to domains with low reputation 24->36 process4 process5 15 x86.elf 7->15         started        18 x86.elf 7->18         started        20 x86.elf 7->20         started        22 x86.elf 7->22         started        signatures6 38 Sample reads /proc/mounts (often used for finding a writable filesystem) 15->38
Threat name:
Linux.Worm.Mirai
Status:
Malicious
First seen:
2025-09-07 03:10:11 UTC
AV detection:
16 of 38 (42.11%)
Threat level:
  5/5
Result
Malware family:
hailbot
Score:
  10/10
Tags:
family:hailbot discovery linux
Behaviour
Reads runtime system information
Changes its process name
Renames itself
Unexpected DNS network traffic destination
Verdict:
Malicious
Tags:
trojan mirai Unix.Trojan.Mirai-9441505-0
YARA:
Linux_Trojan_Mirai_b14f4c5d Linux_Trojan_Mirai_5f7b67b8 Linux_Trojan_Mirai_88de437f Linux_Trojan_Mirai_389ee3e9 Linux_Trojan_Mirai_cc93863b
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:ach_202412_elf_hailbot
Author:abuse.ch
Description:Detects HailBot ELF files
Rule name:CP_AllMal_Detector
Author:DiegoAnalytics
Description:CrossPlatform All Malwares Detector: Detect PE, ELF, Mach-O, scripts, archives; overlay, obfuscation, encryption, spoofing, hiding, high entropy, network communication
Rule name:ELF_Mirai
Author:NDA0E
Description:Detects multiple Mirai variants
Rule name:linux_generic_ipv6_catcher
Author:@_lubiedo
Description:ELF samples using IPv6 addresses
Rule name:Linux_Trojan_Mirai_389ee3e9
Author:Elastic Security
Rule name:Linux_Trojan_Mirai_5f7b67b8
Author:Elastic Security
Rule name:Linux_Trojan_Mirai_88de437f
Author:Elastic Security
Rule name:Linux_Trojan_Mirai_b14f4c5d
Author:Elastic Security
Rule name:Linux_Trojan_Mirai_cc93863b
Author:Elastic Security
Rule name:maldoc_getEIP_method_1
Author:Didier Stevens (https://DidierStevens.com)
Rule name:meth_get_eip
Author:Willi Ballenthin
Rule name:Mirai_Unpack
Rule name:unixredflags3
Author:Tim Brown @timb_machine
Description:Hunts for UNIX red flags

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

elf 6d2cc0cbed11e7ae15f75926c5b89c0c144a41db4987ee2e8c4db2bebeff2944

(this sample)

  
Delivery method
Distributed via web download

Comments