MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 70b782c4667e4a27403dc4581ccd90d1a0998a6d2f8da124ad3646f871b2d8aa. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 8


Intelligence 8 IOCs YARA 1 File information Comments

SHA256 hash: 70b782c4667e4a27403dc4581ccd90d1a0998a6d2f8da124ad3646f871b2d8aa
SHA3-384 hash: bc185496f99f13e4b7fa3f669374bc74ad8ad862f85b0f827935f55fc3533cb882a6e777072e7f789b6b4cd30e2e6c7f
SHA1 hash: ece0ce427369abf62d2481ab69c12e51c4dd0ae0
MD5 hash: cf288f4a4054730a80708d7468fdb002
humanhash: white-kilo-wolfram-mountain
File name:x86
Download: download sample
Signature Mirai
File size:2'264'064 bytes
First seen:2026-02-25 16:06:42 UTC
Last seen:2026-02-25 16:24:18 UTC
File type: elf
MIME type:application/x-executable
ssdeep 49152:+o4SgkpMcyU1HX8WILtly3+pRO1Ttr6xiObkaIEAL/csr:L42pMXqtILB8JtCBXAL/ci
TLSH T1F0A533292406BEFB6D41DE2302C333E3672DD39A27BF499752FAA457C823D87D901285
TrID 50.1% (.) ELF Executable and Linkable format (Linux) (4022/12)
49.8% (.O) ELF Executable and Linkable format (generic) (4000/1)
Magika elf
Reporter abuse_ch
Tags:elf UPX
File size (compressed) :2'264'064 bytes
File size (de-compressed) :7'972'768 bytes
Format:linux/i386
Unpacked file: 819531ec365a50d873244ae503650dee13e8481cf93dc0fec0581d872a05f81f

Intelligence


File Origin
# of uploads :
2
# of downloads :
71
Origin country :
DE DE
Vendor Threat Intelligence
No detections
Result
Verdict:
Malware
Maliciousness:

Behaviour
Runs as daemon
Receives data from a server
Changes access rights for a written file
Launching a process
Sends data to a server
Creating a process from a recently created file
Creating a file
Collects information on the CPU
Changes the time when the file was created, accessed, or modified
Creating a file in the %temp% directory
Connection attempt
Collects information on the OS
Creates or modifies files in /cron to set up autorun
Verdict:
Malicious
Uses P2P?:
false
Uses anti-vm?:
false
Architecture:
x86
Packer:
UPX
Botnet:
unknown
Number of open files:
63
Number of processes launched:
12
Processes remaning?
false
Remote TCP ports scanned:
not identified
Behaviour
no suspicious findings
Botnet C2s
TCP botnet C2(s):
not identified
UDP botnet C2(s):
not identified
Result
Gathering data
Status:
terminated
Behavior Graph:
%3 guuid=1e59a84f-1b00-0000-26a9-c3aa060c0000 pid=3078 /usr/bin/sudo guuid=8a8dac52-1b00-0000-26a9-c3aa0f0c0000 pid=3087 /tmp/sample.bin guuid=1e59a84f-1b00-0000-26a9-c3aa060c0000 pid=3078->guuid=8a8dac52-1b00-0000-26a9-c3aa0f0c0000 pid=3087 execve guuid=8a8dac52-1b00-0000-26a9-c3aa0f0c0000 pid=3184 /tmp/sample.bin guuid=8a8dac52-1b00-0000-26a9-c3aa0f0c0000 pid=3087->guuid=8a8dac52-1b00-0000-26a9-c3aa0f0c0000 pid=3184 clone guuid=8a8dac52-1b00-0000-26a9-c3aa0f0c0000 pid=3185 /tmp/sample.bin guuid=8a8dac52-1b00-0000-26a9-c3aa0f0c0000 pid=3087->guuid=8a8dac52-1b00-0000-26a9-c3aa0f0c0000 pid=3185 clone guuid=8a8dac52-1b00-0000-26a9-c3aa0f0c0000 pid=3186 /tmp/sample.bin guuid=8a8dac52-1b00-0000-26a9-c3aa0f0c0000 pid=3087->guuid=8a8dac52-1b00-0000-26a9-c3aa0f0c0000 pid=3186 clone guuid=8a8dac52-1b00-0000-26a9-c3aa0f0c0000 pid=3187 /tmp/sample.bin guuid=8a8dac52-1b00-0000-26a9-c3aa0f0c0000 pid=3087->guuid=8a8dac52-1b00-0000-26a9-c3aa0f0c0000 pid=3187 clone guuid=2aaad699-1b00-0000-26a9-c3aa740c0000 pid=3188 /tmp/sample.bin zombie guuid=8a8dac52-1b00-0000-26a9-c3aa0f0c0000 pid=3185->guuid=2aaad699-1b00-0000-26a9-c3aa740c0000 pid=3188 execve guuid=2aaad699-1b00-0000-26a9-c3aa740c0000 pid=3225 /tmp/sample.bin zombie guuid=2aaad699-1b00-0000-26a9-c3aa740c0000 pid=3188->guuid=2aaad699-1b00-0000-26a9-c3aa740c0000 pid=3225 clone guuid=2aaad699-1b00-0000-26a9-c3aa740c0000 pid=3226 /tmp/sample.bin guuid=2aaad699-1b00-0000-26a9-c3aa740c0000 pid=3188->guuid=2aaad699-1b00-0000-26a9-c3aa740c0000 pid=3226 clone guuid=2aaad699-1b00-0000-26a9-c3aa740c0000 pid=3227 /tmp/sample.bin guuid=2aaad699-1b00-0000-26a9-c3aa740c0000 pid=3188->guuid=2aaad699-1b00-0000-26a9-c3aa740c0000 pid=3227 clone guuid=2aaad699-1b00-0000-26a9-c3aa740c0000 pid=3228 /tmp/sample.bin write-file zombie guuid=2aaad699-1b00-0000-26a9-c3aa740c0000 pid=3188->guuid=2aaad699-1b00-0000-26a9-c3aa740c0000 pid=3228 clone guuid=2aaad699-1b00-0000-26a9-c3aa740c0000 pid=3229 /tmp/sample.bin guuid=2aaad699-1b00-0000-26a9-c3aa740c0000 pid=3188->guuid=2aaad699-1b00-0000-26a9-c3aa740c0000 pid=3229 clone guuid=2aaad699-1b00-0000-26a9-c3aa740c0000 pid=3230 /tmp/sample.bin guuid=2aaad699-1b00-0000-26a9-c3aa740c0000 pid=3188->guuid=2aaad699-1b00-0000-26a9-c3aa740c0000 pid=3230 clone guuid=2aaad699-1b00-0000-26a9-c3aa740c0000 pid=3231 /tmp/sample.bin guuid=2aaad699-1b00-0000-26a9-c3aa740c0000 pid=3188->guuid=2aaad699-1b00-0000-26a9-c3aa740c0000 pid=3231 clone guuid=469cdac3-1b00-0000-26a9-c3aaa10c0000 pid=3233 /tmp/sample.bin guuid=2aaad699-1b00-0000-26a9-c3aa740c0000 pid=3231->guuid=469cdac3-1b00-0000-26a9-c3aaa10c0000 pid=3233 clone guuid=152400c4-1b00-0000-26a9-c3aaa20c0000 pid=3234 /usr/bin/pgrep guuid=2aaad699-1b00-0000-26a9-c3aa740c0000 pid=3231->guuid=152400c4-1b00-0000-26a9-c3aaa20c0000 pid=3234 execve
Result
Threat name:
n/a
Detection:
malicious
Classification:
troj
Score:
56 / 100
Signature
Executes the "crontab" command typically for achieving persistence
Multi AV Scanner detection for submitted file
Sample tries to persist itself using cron
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1874838 Sample: x86.elf Startdate: 25/02/2026 Architecture: LINUX Score: 56 34 5.59.248.236, 38590, 443 METRO-SET-ASMetrosetAutonomousSystemRU Czech Republic 2->34 36 speed.cloudflare.com 172.66.0.218, 57240, 80 CLOUDFLARENETUS United States 2->36 40 Multi AV Scanner detection for submitted file 2->40 10 x86.elf 2->10         started        signatures3 process4 process5 12 x86.elf x86.elf 10->12         started        process6 14 x86.elf bash 12->14         started        16 x86.elf crontab 12->16         started        19 x86.elf pgrep 12->19         started        21 7 other processes 12->21 signatures7 23 bash crontab 14->23         started        27 bash 14->27         started        38 Executes the "crontab" command typically for achieving persistence 16->38 process8 file9 32 /var/spool/cron/crontabs/tmp.UM0mA7, ASCII 23->32 dropped 42 Sample tries to persist itself using cron 23->42 44 Executes the "crontab" command typically for achieving persistence 23->44 29 bash crontab 27->29         started        signatures10 process11 signatures12 46 Executes the "crontab" command typically for achieving persistence 29->46
Threat name:
Linux.Trojan.Generic
Status:
Suspicious
First seen:
2026-02-25 16:07:47 UTC
File Type:
ELF32 Little (Exe)
AV detection:
4 of 36 (11.11%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  6/10
Tags:
discovery execution linux persistence privilege_escalation upx
Behaviour
GoLang User-Agent
Enumerates kernel/hardware configuration
Reads runtime system information
Writes file to tmp directory
Reads CPU attributes
Creates/modifies Cron job
Enumerates running processes
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:CP_Script_Inject_Detector
Author:DiegoAnalytics
Description:Detects attempts to inject code into another process across PE, ELF, Mach-O binaries

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

elf 70b782c4667e4a27403dc4581ccd90d1a0998a6d2f8da124ad3646f871b2d8aa

(this sample)

Comments