MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 7c3999956b1b2316b86ae8b31d63fd1209bf4e1875dd10b880fe632aa82493ed. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 10


Intelligence 10 IOCs YARA 6 File information Comments

SHA256 hash: 7c3999956b1b2316b86ae8b31d63fd1209bf4e1875dd10b880fe632aa82493ed
SHA3-384 hash: 2da1e25ee6ac89182e8e56d1a294a65c2aa9d84805487f74659ee0995cbc32f29b28722fb4e46f9003bf5f1b15316bc3
SHA1 hash: 0ebf7e32b0d6fc8b5990e57f75936b625e042a99
MD5 hash: cf894381cbefffc7e59118103955dc55
humanhash: aspen-blue-timing-sierra
File name:armhf
Download: download sample
Signature Mirai
File size:734'040 bytes
First seen:2025-05-20 17:32:42 UTC
Last seen:Never
File type: elf
MIME type:application/x-executable
ssdeep 12288:iFzQuzKbTuQia8wK48leMDymfcxdeUNrrTJQ3TW5pWGPNAX4:ivznkKVcjpOK/WGPNAX
TLSH T19DF4BE93EB548E93C599433D08F7832823B6D99917429707AB9DE47C3D8772D9F0B288
telfhash t1fef0a6a04a7d40800d62ec009c5211ff5eebe6aa1e81f945fb8addc52c6e01dfb43e4b
Magika elf
Reporter abuse_ch
Tags:elf mirai

Intelligence


File Origin
# of uploads :
1
# of downloads :
98
Origin country :
DE DE
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Deleting a recently created file
Creating a process from a recently created file
Connection attempt
Creates directories in a subdirectory of a temporary directory
Creating a file
Runs as daemon
Creates directories
Creating a file in the %temp% directory
Sets a written file as executable
Creating a file in the %temp% subdirectories
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
gcc lolbin remote
Verdict:
Malicious
Uses P2P?:
false
Uses anti-vm?:
false
Architecture:
arm
Packer:
not packed
Botnet:
unknown
Number of open files:
0
Number of processes launched:
0
Processes remaning?
false
Remote TCP ports scanned:
not identified
Behaviour
no suspicious findings
Botnet C2s
TCP botnet C2(s):
not identified
UDP botnet C2(s):
not identified
Result
Threat name:
n/a
Detection:
malicious
Classification:
troj.evad
Score:
68 / 100
Signature
Drops files in suspicious directories
Drops invisible ELF files
Malicious sample detected (through community Yara rule)
Sample tries to persist itself using .desktop files
Writes ELF files to hidden directories
Writes identical ELF files to multiple locations
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1695295 Sample: armhf.elf Startdate: 20/05/2025 Architecture: LINUX Score: 68 151 185.125.190.26, 443 CANONICAL-ASGB United Kingdom 2->151 153 daisy.ubuntu.com 2->153 163 Malicious sample detected (through community Yara rule) 2->163 15 armhf.elf 2->15         started        signatures3 process4 file5 143 /tmp/vmware-root_7...ig/.update-368c5f28, ELF 15->143 dropped 145 /tmp/vmware-root_7...he/.update-14a12326, ELF 15->145 dropped 147 /tmp/systemd-priva...ig/.update-5d888af5, ELF 15->147 dropped 149 9 other malicious files 15->149 dropped 155 Writes ELF files to hidden directories 15->155 157 Writes identical ELF files to multiple locations 15->157 159 Sample tries to persist itself using .desktop files 15->159 161 Drops invisible ELF files 15->161 19 armhf.elf 15->19         started        signatures6 process7 process8 21 armhf.elf 19->21         started        file9 81 /usr/local/sbin/update, ELF 21->81 dropped 83 /usr/local/sbin/lists, ELF 21->83 dropped 167 Writes identical ELF files to multiple locations 21->167 25 armhf.elf update 21->25         started        29 armhf.elf lists 21->29         started        signatures10 process11 file12 93 /tmp/vmware-root_7...rt/.update-2c1c8f64, ELF 25->93 dropped 95 /tmp/vmware-root_7...ig/.update-260e4613, ELF 25->95 dropped 97 /tmp/systemd-priva...rt/.update-4983bd5e, ELF 25->97 dropped 105 9 other malicious files 25->105 dropped 177 Writes ELF files to hidden directories 25->177 179 Writes identical ELF files to multiple locations 25->179 181 Sample tries to persist itself using .desktop files 25->181 31 update 25->31         started        99 /tmp/vmware-root_7...rt/.update-3dfea479, ELF 29->99 dropped 101 /tmp/vmware-root_7...ig/.update-4ee7946d, ELF 29->101 dropped 103 /tmp/systemd-priva...art/.update-98986ba, ELF 29->103 dropped 107 9 other malicious files 29->107 dropped 183 Drops invisible ELF files 29->183 33 lists 29->33         started        signatures13 process14 process15 35 update 31->35         started        39 lists 33->39         started        file16 73 /usr/local/sbin/updater, ELF 35->73 dropped 75 /usr/local/sbin/servers, ELF 35->75 dropped 165 Writes identical ELF files to multiple locations 35->165 41 update updater 35->41         started        45 update servers 35->45         started        77 /usr/local/bin/update, ELF 39->77 dropped 79 /usr/local/bin/lists, ELF 39->79 dropped 47 lists lists 39->47         started        49 lists update 39->49         started        signatures17 process18 file19 109 /tmp/vmware-root_7...rt/.update-59ebc7ec, ELF 41->109 dropped 119 11 other malicious files 41->119 dropped 185 Drops invisible ELF files 41->185 51 updater 41->51         started        111 /tmp/vmware-root_7...rt/.update-4bf70b1a, ELF 45->111 dropped 113 /tmp/vmware-root_7...nfig/.update-5da528, ELF 45->113 dropped 121 10 other malicious files 45->121 dropped 53 servers 45->53         started        115 /tmp/vmware-root_7...rt/.update-6e01422f, ELF 47->115 dropped 123 11 other malicious files 47->123 dropped 187 Writes ELF files to hidden directories 47->187 189 Writes identical ELF files to multiple locations 47->189 191 Sample tries to persist itself using .desktop files 47->191 55 lists 47->55         started        117 /tmp/vmware-root_7...rt/.update-5c84fc21, ELF 49->117 dropped 125 11 other malicious files 49->125 dropped 57 update 49->57         started        signatures20 process21 process22 59 updater 51->59         started        63 servers 53->63         started        65 lists 55->65         started        67 update 57->67         started        file23 127 /usr/sbin/lists, ELF 59->127 dropped 129 /usr/local/bin/updater, ELF 59->129 dropped 131 /usr/sbin/update, ELF 63->131 dropped 133 /usr/local/bin/servers, ELF 63->133 dropped 69 servers servers 63->69         started        135 /usr/sbin/updater, ELF 65->135 dropped 137 /usr/sbin/servers, ELF 65->137 dropped 193 Writes identical ELF files to multiple locations 65->193 195 Drops files in suspicious directories 65->195 139 /usr/bin/update, ELF 67->139 dropped 141 /usr/bin/lists, ELF 67->141 dropped signatures24 process25 file26 85 /tmp/vmware-root_7...rt/.update-5f99947c, ELF 69->85 dropped 87 /tmp/vmware-root_7...ig/.update-5c55911b, ELF 69->87 dropped 89 /tmp/systemd-priva...rt/.update-3e5d0b86, ELF 69->89 dropped 91 9 other malicious files 69->91 dropped 169 Writes ELF files to hidden directories 69->169 171 Writes identical ELF files to multiple locations 69->171 173 Sample tries to persist itself using .desktop files 69->173 175 Drops invisible ELF files 69->175 signatures27
Threat name:
Linux.Trojan.SAgnt
Status:
Malicious
First seen:
2025-05-20 17:23:59 UTC
File Type:
ELF32 Little (Exe)
AV detection:
13 of 38 (34.21%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
defense_evasion execution persistence privilege_escalation
Behaviour
Writes file to shm directory
Writes file to tmp directory
Creates .desktop file
Modifies Bash startup script
Creates/modifies environment variables
Write file to user bin folder
Writes file to system bin folder
Executes dropped EXE
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:F01_s1ckrule
Author:s1ckb017
Rule name:ldpreload
Author:xorseed
Reference:https://stuff.rop.io/
Rule name:linux_generic_ipv6_catcher
Author:@_lubiedo
Description:ELF samples using IPv6 addresses
Rule name:malwareelf55503
Rule name:setsockopt
Author:Tim Brown @timb_machine
Description:Hunts for setsockopt() red flags
Rule name:unixredflags3
Author:Tim Brown @timb_machine
Description:Hunts for UNIX red flags

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

elf 7c3999956b1b2316b86ae8b31d63fd1209bf4e1875dd10b880fe632aa82493ed

(this sample)

  
Delivery method
Distributed via web download

Comments