MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 724d3bc953ebe1ccf8ee7f880eb52491db3dd37c471da1435c99108b1f36448c. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 8


Intelligence 8 IOCs YARA File information Comments

SHA256 hash: 724d3bc953ebe1ccf8ee7f880eb52491db3dd37c471da1435c99108b1f36448c
SHA3-384 hash: 53dde4efda76ff3635edf6b72647d6bd93a01c920a2ff3104050a7f75581b12479990a89a9d17dbcdc792e0472fa1b39
SHA1 hash: d1990d63b1ef7c4403e219201140254f47a9cbb8
MD5 hash: 42547fa39173b1305baed727998f8ca8
humanhash: hamper-violet-washington-salami
File name:dlr.spc
Download: download sample
Signature Mirai
File size:1'392 bytes
First seen:2026-01-15 04:32:15 UTC
Last seen:2026-01-15 06:27:47 UTC
File type: elf
MIME type:application/x-executable
ssdeep 24:3eGvDq3N0yTK+59k7z8MAQOlhCrjSkvFSJ9lpCuFmFmFmF8NoXawqvV:JWVT3Wz8M5Dv+9KuUUUiNzNV
TLSH T1A021EE3BFBBB8F07C492A0B90FA353543620EC6804259269BB61BE4DCC116917E952F0
TrID 50.1% (.) ELF Executable and Linkable format (Linux) (4022/12)
49.8% (.O) ELF Executable and Linkable format (generic) (4000/1)
Magika elf
Reporter abuse_ch
Tags:elf mirai

Intelligence


File Origin
# of uploads :
3
# of downloads :
119
Origin country :
DE DE
Vendor Threat Intelligence
No detections
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
gcc masquerade mirai
Verdict:
Malicious
File Type:
elf.32.be
First seen:
2026-01-15T01:52:00Z UTC
Last seen:
2026-01-15T12:48:00Z UTC
Hits:
~10
Status:
terminated
Behavior Graph:
%3 guuid=6dcf46d3-1a00-0000-5da2-5bc66b0b0000 pid=2923 /usr/bin/sudo guuid=015939d5-1a00-0000-5da2-5bc66c0b0000 pid=2924 /tmp/sample.bin guuid=6dcf46d3-1a00-0000-5da2-5bc66b0b0000 pid=2923->guuid=015939d5-1a00-0000-5da2-5bc66c0b0000 pid=2924 execve
Result
Threat name:
n/a
Detection:
malicious
Classification:
n/a
Score:
48 / 100
Signature
Multi AV Scanner detection for submitted file
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1851046 Sample: dlr.spc.elf Startdate: 15/01/2026 Architecture: LINUX Score: 48 14 169.254.169.254, 80 USDOSUS Reserved 2->14 16 162.213.35.24, 40394, 443 CANONICAL-ASGB United States 2->16 18 3 other IPs or domains 2->18 20 Multi AV Scanner detection for submitted file 2->20 6 python3.8 dpkg 2->6         started        8 dash rm 2->8         started        10 dash rm 2->10         started        12 dlr.spc.elf 2->12         started        signatures3 process4
Threat name:
Linux.Worm.Mirai
Status:
Malicious
First seen:
2026-01-15 04:33:27 UTC
File Type:
ELF32 Big (Exe)
AV detection:
9 of 36 (25.00%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  1/10
Tags:
linux
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

elf 724d3bc953ebe1ccf8ee7f880eb52491db3dd37c471da1435c99108b1f36448c

(this sample)

  
Delivery method
Distributed via web download

Comments