MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 773359bb3f8688b759931ef9094f27cd586b6708c47b623c39fb0f20658877f4. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 10


Intelligence 10 IOCs YARA 3 File information Comments

SHA256 hash: 773359bb3f8688b759931ef9094f27cd586b6708c47b623c39fb0f20658877f4
SHA3-384 hash: 089c11ab95733be9c48ed14c99e4aa19299ca289b6057d1d0967735b80118aa49f2252a74903e544e66169acec8bc666
SHA1 hash: 86b73932c33a142b236dfb53dede4046d52a1c04
MD5 hash: eeb7d360177760510d209ea414397f96
humanhash: cardinal-maine-rugby-march
File name:x86_64
Download: download sample
Signature Mirai
File size:74'892 bytes
First seen:2025-12-26 01:05:23 UTC
Last seen:2025-12-26 01:15:18 UTC
File type: elf
MIME type:application/x-executable
ssdeep 1536:Gac9YHTkA5qVpFnwZ9g96uwFUSG/kMvwis2WMWAzUnQtlwThnA3:89PAWLAnuqUBzqxMAnLhA3
TLSH T18A73F1B7A56677BAD25788B20C4D07C0EAA03607B3528E1B049ED4BC8C1BF94DA35FD1
TrID 50.1% (.) ELF Executable and Linkable format (Linux) (4022/12)
49.8% (.O) ELF Executable and Linkable format (generic) (4000/1)
Magika elf
Reporter abuse_ch
Tags:elf mirai UPX
File size (compressed) :74'892 bytes
File size (de-compressed) :209'352 bytes
Format:linux/amd64
Unpacked file: 861594e2f4e64e61b268d57305110a115cc4dc2ea920e56c1e901f13288391ff

Intelligence


File Origin
# of uploads :
2
# of downloads :
51
Origin country :
DE DE
Vendor Threat Intelligence
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
gafgyt mirai obfuscated packed upx
Verdict:
Malicious
File Type:
elf.64.le
First seen:
2025-12-25T23:20:00Z UTC
Last seen:
2025-12-26T02:02:00Z UTC
Hits:
~10
Status:
terminated
Behavior Graph:
%3 guuid=a6bd6b13-1a00-0000-d5c1-505480080000 pid=2176 /usr/bin/sudo guuid=9faf6f16-1a00-0000-d5c1-505486080000 pid=2182 /tmp/sample.bin mprotect-exec net guuid=a6bd6b13-1a00-0000-d5c1-505480080000 pid=2176->guuid=9faf6f16-1a00-0000-d5c1-505486080000 pid=2182 execve 8b0a01dc-0728-52c1-8024-c4ba7801b8d6 8.8.8.8:53 guuid=9faf6f16-1a00-0000-d5c1-505486080000 pid=2182->8b0a01dc-0728-52c1-8024-c4ba7801b8d6 con guuid=7f766317-1a00-0000-d5c1-505489080000 pid=2185 /tmp/sample.bin write-config write-file zombie guuid=9faf6f16-1a00-0000-d5c1-505486080000 pid=2182->guuid=7f766317-1a00-0000-d5c1-505489080000 pid=2185 clone guuid=98eca817-1a00-0000-d5c1-50548a080000 pid=2186 /usr/bin/dash guuid=7f766317-1a00-0000-d5c1-505489080000 pid=2185->guuid=98eca817-1a00-0000-d5c1-50548a080000 pid=2186 execve guuid=a9a23b19-1a00-0000-d5c1-50548f080000 pid=2191 /usr/bin/dash guuid=7f766317-1a00-0000-d5c1-505489080000 pid=2185->guuid=a9a23b19-1a00-0000-d5c1-50548f080000 pid=2191 execve guuid=14b43627-1a00-0000-d5c1-5054b6080000 pid=2230 /tmp/sample.bin guuid=7f766317-1a00-0000-d5c1-505489080000 pid=2185->guuid=14b43627-1a00-0000-d5c1-5054b6080000 pid=2230 clone guuid=a3853b27-1a00-0000-d5c1-5054b7080000 pid=2231 /tmp/sample.bin guuid=7f766317-1a00-0000-d5c1-505489080000 pid=2185->guuid=a3853b27-1a00-0000-d5c1-5054b7080000 pid=2231 clone guuid=2cdba151-1b00-0000-d5c1-5054e80a0000 pid=2792 /tmp/sample.bin guuid=7f766317-1a00-0000-d5c1-505489080000 pid=2185->guuid=2cdba151-1b00-0000-d5c1-5054e80a0000 pid=2792 clone guuid=d66f047d-1c00-0000-d5c1-5054d00c0000 pid=3280 /tmp/sample.bin guuid=7f766317-1a00-0000-d5c1-505489080000 pid=2185->guuid=d66f047d-1c00-0000-d5c1-5054d00c0000 pid=3280 clone guuid=b7bff1a7-1d00-0000-d5c1-5054b50f0000 pid=4021 /tmp/sample.bin guuid=7f766317-1a00-0000-d5c1-505489080000 pid=2185->guuid=b7bff1a7-1d00-0000-d5c1-5054b50f0000 pid=4021 clone guuid=9380bad2-1e00-0000-d5c1-505405130000 pid=4869 /tmp/sample.bin guuid=7f766317-1a00-0000-d5c1-505489080000 pid=2185->guuid=9380bad2-1e00-0000-d5c1-505405130000 pid=4869 clone guuid=22632afd-1f00-0000-d5c1-505481140000 pid=5249 /tmp/sample.bin guuid=7f766317-1a00-0000-d5c1-505489080000 pid=2185->guuid=22632afd-1f00-0000-d5c1-505481140000 pid=5249 clone guuid=8bae0d28-2100-0000-d5c1-505489140000 pid=5257 /tmp/sample.bin guuid=7f766317-1a00-0000-d5c1-505489080000 pid=2185->guuid=8bae0d28-2100-0000-d5c1-505489140000 pid=5257 clone guuid=7f1bd452-2200-0000-d5c1-5054aa140000 pid=5290 /tmp/sample.bin guuid=7f766317-1a00-0000-d5c1-505489080000 pid=2185->guuid=7f1bd452-2200-0000-d5c1-5054aa140000 pid=5290 clone guuid=5e7f8b7d-2300-0000-d5c1-5054ab140000 pid=5291 /tmp/sample.bin guuid=7f766317-1a00-0000-d5c1-505489080000 pid=2185->guuid=5e7f8b7d-2300-0000-d5c1-5054ab140000 pid=5291 clone guuid=4be343a8-2400-0000-d5c1-5054ac140000 pid=5292 /tmp/sample.bin guuid=7f766317-1a00-0000-d5c1-505489080000 pid=2185->guuid=4be343a8-2400-0000-d5c1-5054ac140000 pid=5292 clone guuid=7bb2f3d2-2500-0000-d5c1-5054ad140000 pid=5293 /tmp/sample.bin guuid=7f766317-1a00-0000-d5c1-505489080000 pid=2185->guuid=7bb2f3d2-2500-0000-d5c1-5054ad140000 pid=5293 clone guuid=ca1aadfd-2600-0000-d5c1-5054ae140000 pid=5294 /tmp/sample.bin guuid=7f766317-1a00-0000-d5c1-505489080000 pid=2185->guuid=ca1aadfd-2600-0000-d5c1-5054ae140000 pid=5294 clone guuid=ece05728-2800-0000-d5c1-5054b9140000 pid=5305 /tmp/sample.bin guuid=7f766317-1a00-0000-d5c1-505489080000 pid=2185->guuid=ece05728-2800-0000-d5c1-5054b9140000 pid=5305 clone guuid=bab0da17-1a00-0000-d5c1-50548b080000 pid=2187 /usr/bin/systemctl guuid=98eca817-1a00-0000-d5c1-50548a080000 pid=2186->guuid=bab0da17-1a00-0000-d5c1-50548b080000 pid=2187 execve guuid=0e748119-1a00-0000-d5c1-505491080000 pid=2193 /usr/bin/systemctl guuid=a9a23b19-1a00-0000-d5c1-50548f080000 pid=2191->guuid=0e748119-1a00-0000-d5c1-505491080000 pid=2193 execve
Result
Threat name:
Detection:
malicious
Classification:
troj.evad
Score:
68 / 100
Signature
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Sample is packed with UPX
Yara detected Gafgyt
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1839563 Sample: x86_64.elf Startdate: 26/12/2025 Architecture: LINUX Score: 68 27 Malicious sample detected (through community Yara rule) 2->27 29 Multi AV Scanner detection for submitted file 2->29 31 Yara detected Gafgyt 2->31 33 Sample is packed with UPX 2->33 8 x86_64.elf 2->8         started        process3 process4 10 x86_64.elf 8->10         started        file5 25 /usr/local/bin/infinitd, ELF 10->25 dropped 13 x86_64.elf sh 10->13         started        15 x86_64.elf sh 10->15         started        17 x86_64.elf 10->17         started        19 24 other processes 10->19 process6 process7 21 sh systemctl 13->21         started        23 sh systemctl 15->23         started       
Threat name:
Linux.Backdoor.Mirai
Status:
Malicious
First seen:
2025-12-26 01:19:49 UTC
AV detection:
12 of 24 (50.00%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:mirai botnet discovery linux persistence privilege_escalation upx
Behaviour
Reads runtime system information
Changes its process name
Reads system network configuration
UPX packed file
Enumerates active TCP sockets
Enumerates running processes
Modifies systemd
Write file to user bin folder
Mirai
Mirai family
Malware Config
C2 Extraction:
teamc2.duckdns.org
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:linux_generic_ipv6_catcher
Author:@_lubiedo
Description:ELF samples using IPv6 addresses
Rule name:SUSP_ELF_LNX_UPX_Compressed_File
Author:Florian Roth (Nextron Systems)
Description:Detects a suspicious ELF binary with UPX compression
Reference:Internal Research
Rule name:upx_packed_elf_v1
Author:RandomMalware

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

elf 773359bb3f8688b759931ef9094f27cd586b6708c47b623c39fb0f20658877f4

(this sample)

  
Delivery method
Distributed via web download

Comments