MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 83ee9612b0a6c4fe26e320e6eb953a4f5f49a4a50a8c9070a867f8ad02f19601. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 9


Intelligence 9 IOCs YARA File information Comments

SHA256 hash: 83ee9612b0a6c4fe26e320e6eb953a4f5f49a4a50a8c9070a867f8ad02f19601
SHA3-384 hash: d2f21cfec0d0409526029e89dacbe9a155fa88778db9ecfbbaa406fd37c0eb382bbb16e12b7995433de8ba661e4837d8
SHA1 hash: 699dc78c2fc34d505037c31d6a72d0a753e8bab2
MD5 hash: aed2ebf65f90a495974c990b23dace43
humanhash: sierra-arizona-kilo-zebra
File name:skid.armv5l
Download: download sample
Signature Mirai
File size:111'368 bytes
First seen:2025-04-17 09:44:23 UTC
Last seen:2025-04-17 11:18:57 UTC
File type: elf
MIME type:application/x-executable
ssdeep 1536:UfnSX5GH2y2xxRfv6i7hosvdKxu0+n244oQ6csi/VU0heqTVrzHh3sgS/3kC7ORj:d5HvRfhosvdKx4n2kQai/04h3NTjt
TLSH T198B30A8DE8A16B15C1E96ABAFE5D45CD330217BCD2EA31158D065F20678F88D0E3EBC5
Magika elf
Reporter abuse_ch
Tags:elf mirai

Intelligence


File Origin
# of uploads :
2
# of downloads :
61
Origin country :
DE DE
Vendor Threat Intelligence
Result
Verdict:
Suspicious
Maliciousness:

Behaviour
Creating a file
Substitutes an application name
Verdict:
Malicious
Uses P2P?:
false
Uses anti-vm?:
false
Architecture:
arm
Packer:
not packed
Botnet:
unknown
Number of open files:
108
Number of processes launched:
2
Processes remaning?
true
Remote TCP ports scanned:
not identified
Behaviour
Process Renaming
Botnet C2s
TCP botnet C2(s):
not identified
UDP botnet C2(s):
type: 74.125.250.129:19302
Result
Threat name:
n/a
Detection:
malicious
Classification:
troj.evad
Score:
56 / 100
Signature
Performs DNS TXT record lookups
Suricata IDS alerts for network traffic
Uses STUN server to do NAT traversial
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1667339 Sample: skid.armv5l.elf Startdate: 17/04/2025 Architecture: LINUX Score: 56 14 6mv1eyr328y6due83u3js6whtzuxfyhw.su 2->14 16 stun.l.google.com 2->16 18 2 other IPs or domains 2->18 20 Suricata IDS alerts for network traffic 2->20 8 skid.armv5l.elf 2->8         started        signatures3 22 Performs DNS TXT record lookups 14->22 24 Uses STUN server to do NAT traversial 16->24 process4 process5 10 skid.armv5l.elf 8->10         started        process6 12 skid.armv5l.elf 10->12         started       
Threat name:
Linux.Worm.Mirai
Status:
Malicious
First seen:
2025-04-17 09:45:28 UTC
File Type:
ELF32 Little (Exe)
AV detection:
8 of 24 (33.33%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
credential_access discovery
Behaviour
Reads runtime system information
Changes its process name
Reads process memory
Enumerates running processes
Renames itself
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

elf 83ee9612b0a6c4fe26e320e6eb953a4f5f49a4a50a8c9070a867f8ad02f19601

(this sample)

Comments