MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 81662d8f51045b48c41615a7642e1a6ee5cdaad424255ea40c7856caf1d526f9. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 9


Intelligence 9 IOCs YARA File information Comments

SHA256 hash: 81662d8f51045b48c41615a7642e1a6ee5cdaad424255ea40c7856caf1d526f9
SHA3-384 hash: e15b7907bb1e9fffe45d748987e7ce337a487a300f4a5f5922e612abffb7b2c159b2b313cd32dbf9669f2a788c10f6da
SHA1 hash: a269ed73023ac2dc1f0051911510b49c78aa6529
MD5 hash: 263ebd3212f65036d313c3458c9f0f4a
humanhash: alaska-hot-pasta-beer
File name:boatnet.arm
Download: download sample
Signature Mirai
File size:22'160 bytes
First seen:2022-06-30 22:50:09 UTC
Last seen:2022-07-13 06:50:12 UTC
File type: elf
MIME type:application/x-executable
ssdeep 384:vvtIoZxrSniaXs+qx+bwqPX+VOcFd5fHq52lxjEhymdGUop5hA:vvQn4j+ZO5fKAlxws3Uozq
TLSH T19FA2E01072A32D66E39D1C3DC96A835BB9A70BFC90F533766D415A20C94D24A2E39A4B
TrID 50.1% (.) ELF Executable and Linkable format (Linux) (4022/12)
49.8% (.O) ELF Executable and Linkable format (generic) (4000/1)
Reporter tolisec
Tags:mirai

Intelligence


File Origin
# of uploads :
2
# of downloads :
169
Origin country :
n/a
Vendor Threat Intelligence
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
anti-debug
Verdict:
Malicious
Uses P2P?:
false
Uses anti-vm?:
false
Architecture:
arm
Packer:
UPX
Botnet:
49.12.233.88:80/hiddenbin
Number of open files:
25
Number of processes launched:
3
Processes remaning?
false
Remote TCP ports scanned:
not identified
Behaviour
no suspicious findings
Botnet C2s
TCP botnet C2(s):
49.12.233.88:3778
UDP botnet C2(s):
not identified
Result
Verdict:
UNKNOWN
Result
Threat name:
Detection:
malicious
Classification:
spre.troj.evad
Score:
64 / 100
Signature
Multi AV Scanner detection for submitted file
Sample is packed with UPX
Sample tries to kill multiple processes (SIGKILL)
Yara detected Mirai
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 655360 Sample: boatnet.arm Startdate: 01/07/2022 Architecture: LINUX Score: 64 46 109.202.202.202, 80 INIT7CH Switzerland 2->46 48 49.12.233.88, 3778, 51402 HETZNER-ASDE Germany 2->48 50 2 other IPs or domains 2->50 52 Multi AV Scanner detection for submitted file 2->52 54 Yara detected Mirai 2->54 56 Sample is packed with UPX 2->56 9 systemd logrotate 2->9         started        11 dash rm boatnet.arm 2->11         started        13 python3.8 uname 2->13         started        15 18 other processes 2->15 signatures3 process4 process5 17 logrotate sh 9->17         started        19 logrotate sh 9->19         started        21 logrotate gzip 9->21         started        23 logrotate gzip 9->23         started        25 boatnet.arm 11->25         started        28 boatnet.arm 11->28         started        30 boatnet.arm 11->30         started        signatures6 32 sh invoke-rc.d 17->32         started        34 sh rsyslog-rotate 19->34         started        58 Sample tries to kill multiple processes (SIGKILL) 25->58 process7 process8 36 invoke-rc.d runlevel 32->36         started        38 invoke-rc.d systemctl 32->38         started        40 invoke-rc.d ls 32->40         started        42 invoke-rc.d systemctl 32->42         started        44 rsyslog-rotate systemctl 34->44         started       
Threat name:
Linux.Trojan.Mirai
Status:
Malicious
First seen:
2022-06-30 22:51:07 UTC
File Type:
ELF32 Little (Exe)
AV detection:
15 of 25 (60.00%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  1/10
Tags:
linux
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments