MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 708f064aefc524d3a5c2814625615ff5eb13693d578eb5990ff99a2903dce03b. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 10


Intelligence 10 IOCs YARA File information Comments

SHA256 hash: 708f064aefc524d3a5c2814625615ff5eb13693d578eb5990ff99a2903dce03b
SHA3-384 hash: 46facedc3591c57c0b4663b0a121b4c6e0b5398b6ef777096364404bb85fe14adeaf339a53faa311ab09c81c69064183
SHA1 hash: 3449627f30b06d1ec04ead33a7483e0ad4951865
MD5 hash: 49b158cc55bd44062726a013c0461d91
humanhash: jupiter-foxtrot-happy-failed
File name:Josho.sh4
Download: download sample
Signature Mirai
File size:51'336 bytes
First seen:2025-12-23 22:59:29 UTC
Last seen:Never
File type: elf
MIME type:application/x-executable
ssdeep 1536:5aR5ewtQZ0t8GdcPs3q/aKlMLEm0DOFCn:5k5eDy2P+qiK60CF
TLSH T181338DA6D5BDEDA8C1544AB87D258F389B73E00086533EFAD644C65A8047EECF1593F0
TrID 50.1% (.) ELF Executable and Linkable format (Linux) (4022/12)
49.8% (.O) ELF Executable and Linkable format (generic) (4000/1)
Magika elf
Reporter abuse_ch
Tags:elf mirai

Intelligence


File Origin
# of uploads :
1
# of downloads :
74
Origin country :
DE DE
Vendor Threat Intelligence
Malware configuration found for:
Mirai
Details
Mirai
a c2 socket address and a scan socket address
Result
Gathering data
Status:
terminated
Behavior Graph:
%3 guuid=a4d0c684-1a00-0000-68f3-e77bb70a0000 pid=2743 /usr/bin/sudo guuid=888dfe87-1a00-0000-68f3-e77bbc0a0000 pid=2748 /tmp/sample.bin guuid=a4d0c684-1a00-0000-68f3-e77bb70a0000 pid=2743->guuid=888dfe87-1a00-0000-68f3-e77bbc0a0000 pid=2748 execve
Result
Threat name:
n/a
Detection:
malicious
Classification:
spre
Score:
60 / 100
Signature
Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Sample tries to kill multiple processes (SIGKILL)
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1838538 Sample: Josho.sh4.elf Startdate: 24/12/2025 Architecture: LINUX Score: 60 31 207.235.146.186 ZAYO-6461US United States 2->31 33 71.22.0.199 WINDSTREAMUS United States 2->33 35 99 other IPs or domains 2->35 37 Antivirus / Scanner detection for submitted sample 2->37 39 Multi AV Scanner detection for submitted file 2->39 9 Josho.sh4.elf 2->9         started        11 python3.8 dpkg 2->11         started        signatures3 process4 process5 13 Josho.sh4.elf 9->13         started        15 Josho.sh4.elf 9->15         started        18 Josho.sh4.elf 9->18         started        signatures6 20 Josho.sh4.elf 13->20         started        23 Josho.sh4.elf 13->23         started        25 Josho.sh4.elf 13->25         started        43 Sample tries to kill multiple processes (SIGKILL) 15->43 process7 signatures8 41 Sample tries to kill multiple processes (SIGKILL) 20->41 27 Josho.sh4.elf 20->27         started        29 Josho.sh4.elf 20->29         started        process9
Threat name:
Linux.Worm.Mirai
Status:
Malicious
First seen:
2025-12-23 14:09:46 UTC
File Type:
ELF32 Little (Exe)
AV detection:
25 of 36 (69.44%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:mirai linux
Verdict:
Malicious
Tags:
Unix.Dropper.Mirai-7135890-0
YARA:
n/a
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

elf 708f064aefc524d3a5c2814625615ff5eb13693d578eb5990ff99a2903dce03b

(this sample)

  
Delivery method
Distributed via web download

Comments