MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 85fb4996fd46b91bda84aae63acad45d0d5784782d09fbf5141aeb426a2ca5c6. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 13


Intelligence 13 IOCs YARA 21 File information Comments

SHA256 hash: 85fb4996fd46b91bda84aae63acad45d0d5784782d09fbf5141aeb426a2ca5c6
SHA3-384 hash: 60acb9986f54a6b4167ca8e4f2876bf0120e9939c717f0bb5addcba4695f0d059fd1e74d2baa876b00bc0bde8c7c6350
SHA1 hash: 556835e8a6829599c9e827424497fcff34f8329e
MD5 hash: d8f62389b2c5c156bcacd96241bb8ff8
humanhash: red-johnny-mirror-mango
File name:bot
Download: download sample
Signature Mirai
File size:10'166'984 bytes
First seen:2025-11-25 17:33:27 UTC
Last seen:Never
File type: elf
MIME type:application/x-sharedlib
ssdeep 98304:5ExDKrBIe6uK1JcVb28DTYtxeOmJosFNQ98s9PEqlWmEfpIawQW0OZkG4ckRUa3y:5EBuKpE0SUa3Gn8gMB+5qNnIFzAF
TLSH T14EA67C4BF5A358ECC09AC430475FD663A931B89442317E7B3694AA342E77E305B6EF21
TrID 50.1% (.) ELF Executable and Linkable format (Linux) (4022/12)
49.8% (.O) ELF Executable and Linkable format (generic) (4000/1)
Magika elf
Reporter abuse_ch
Tags:elf mirai upx-dec


Avatar
abuse_ch
UPX decompressed file, sourced from SHA256 f5a7fd53488638cd3c36f39bdb6b9b35dc6df14ad837dd30eb87b95262feb2f5
File size (compressed) :3'683'088 bytes
File size (de-compressed) :10'166'984 bytes
Format:linux/amd64
Packed file: f5a7fd53488638cd3c36f39bdb6b9b35dc6df14ad837dd30eb87b95262feb2f5

Intelligence


File Origin
# of uploads :
1
# of downloads :
46
Origin country :
NL NL
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Runs as daemon
Opens a port
Manages services
Launching a process
Sets a written file as executable
Creating a file
Collects information on the CPU
Collects information on the OS
Creates or modifies files in /cron to set up autorun
Substitutes an application name
Creates or modifies files in /init.d to set up autorun
Creates or modifies files to set up autorun
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
coinminer gcc miner monero rust xmrig
Verdict:
Malicious
Uses P2P?:
false
Uses anti-vm?:
false
Architecture:
x86
Packer:
not packed
Botnet:
unknown
Number of open files:
70
Number of processes launched:
24
Processes remaning?
true
Remote TCP ports scanned:
not identified
Behaviour
Persistence
Process Renaming
Botnet C2s
TCP botnet C2(s):
not identified
UDP botnet C2(s):
not identified
Verdict:
Malicious
File Type:
elf.64.le
First seen:
2025-11-25T15:46:00Z UTC
Last seen:
2025-11-25T16:09:00Z UTC
Hits:
~10
Status:
terminated
Behavior Graph:
%3 guuid=ee19c284-1900-0000-abae-96a851120000 pid=4689 /usr/bin/sudo guuid=25cd2e87-1900-0000-abae-96a85e120000 pid=4702 /tmp/sample.bin guuid=ee19c284-1900-0000-abae-96a851120000 pid=4689->guuid=25cd2e87-1900-0000-abae-96a85e120000 pid=4702 execve guuid=01cc9787-1900-0000-abae-96a862120000 pid=4706 /tmp/dockerd net send-data write-config write-file zombie guuid=25cd2e87-1900-0000-abae-96a85e120000 pid=4702->guuid=01cc9787-1900-0000-abae-96a862120000 pid=4706 clone 5ad56c95-acd0-5f58-bd4b-c54f6757cd18 223.5.5.5:80 guuid=01cc9787-1900-0000-abae-96a862120000 pid=4706->5ad56c95-acd0-5f58-bd4b-c54f6757cd18 send: 1024B ff10556a-515f-5ab1-af3d-7acefafa9524 195.24.237.46:48996 guuid=01cc9787-1900-0000-abae-96a862120000 pid=4706->ff10556a-515f-5ab1-af3d-7acefafa9524 send: 42B guuid=ca4472a1-1900-0000-abae-96a8c1120000 pid=4801 /tmp/dockerd guuid=01cc9787-1900-0000-abae-96a862120000 pid=4706->guuid=ca4472a1-1900-0000-abae-96a8c1120000 pid=4801 clone guuid=7d41afa9-1900-0000-abae-96a8d5120000 pid=4821 /usr/bin/dash guuid=01cc9787-1900-0000-abae-96a862120000 pid=4706->guuid=7d41afa9-1900-0000-abae-96a8d5120000 pid=4821 execve guuid=717dd211-1a00-0000-abae-96a866140000 pid=5222 /usr/bin/dash guuid=01cc9787-1900-0000-abae-96a862120000 pid=4706->guuid=717dd211-1a00-0000-abae-96a866140000 pid=5222 execve guuid=2b8fbeb8-1a00-0000-abae-96a8b5140000 pid=5301 /usr/bin/dash guuid=01cc9787-1900-0000-abae-96a862120000 pid=4706->guuid=2b8fbeb8-1a00-0000-abae-96a8b5140000 pid=5301 execve guuid=5fe4f5b8-1a00-0000-abae-96a8b6140000 pid=5302 /usr/bin/dash write-config guuid=01cc9787-1900-0000-abae-96a862120000 pid=4706->guuid=5fe4f5b8-1a00-0000-abae-96a8b6140000 pid=5302 execve guuid=202726b9-1a00-0000-abae-96a8b7140000 pid=5303 /usr/bin/dash guuid=01cc9787-1900-0000-abae-96a862120000 pid=4706->guuid=202726b9-1a00-0000-abae-96a8b7140000 pid=5303 execve guuid=563a35ba-1a00-0000-abae-96a8b9140000 pid=5305 /usr/bin/dash guuid=01cc9787-1900-0000-abae-96a862120000 pid=4706->guuid=563a35ba-1a00-0000-abae-96a8b9140000 pid=5305 execve guuid=148490bb-1a00-0000-abae-96a8bb140000 pid=5307 /usr/bin/dash guuid=01cc9787-1900-0000-abae-96a862120000 pid=4706->guuid=148490bb-1a00-0000-abae-96a8bb140000 pid=5307 execve guuid=a8d682ea-1a00-0000-abae-96a8d1140000 pid=5329 /usr/bin/dash guuid=01cc9787-1900-0000-abae-96a862120000 pid=4706->guuid=a8d682ea-1a00-0000-abae-96a8d1140000 pid=5329 execve guuid=059c5e11-1b00-0000-abae-96a8ee140000 pid=5358 /usr/bin/dash guuid=01cc9787-1900-0000-abae-96a862120000 pid=4706->guuid=059c5e11-1b00-0000-abae-96a8ee140000 pid=5358 execve guuid=29f02012-1b00-0000-abae-96a8f0140000 pid=5360 /usr/bin/dash write-file guuid=01cc9787-1900-0000-abae-96a862120000 pid=4706->guuid=29f02012-1b00-0000-abae-96a8f0140000 pid=5360 execve guuid=478b6412-1b00-0000-abae-96a8f1140000 pid=5361 /usr/bin/dash write-config guuid=01cc9787-1900-0000-abae-96a862120000 pid=4706->guuid=478b6412-1b00-0000-abae-96a8f1140000 pid=5361 execve guuid=aceab012-1b00-0000-abae-96a8f2140000 pid=5362 /usr/bin/dash guuid=01cc9787-1900-0000-abae-96a862120000 pid=4706->guuid=aceab012-1b00-0000-abae-96a8f2140000 pid=5362 execve guuid=5b39e712-1b00-0000-abae-96a8f3140000 pid=5363 /usr/bin/dash guuid=01cc9787-1900-0000-abae-96a862120000 pid=4706->guuid=5b39e712-1b00-0000-abae-96a8f3140000 pid=5363 execve guuid=51532313-1b00-0000-abae-96a8f4140000 pid=5364 /usr/bin/dash guuid=01cc9787-1900-0000-abae-96a862120000 pid=4706->guuid=51532313-1b00-0000-abae-96a8f4140000 pid=5364 execve guuid=c3785b13-1b00-0000-abae-96a8f5140000 pid=5365 /usr/bin/dash guuid=01cc9787-1900-0000-abae-96a862120000 pid=4706->guuid=c3785b13-1b00-0000-abae-96a8f5140000 pid=5365 execve guuid=5879a213-1b00-0000-abae-96a8f6140000 pid=5366 /usr/bin/dash guuid=01cc9787-1900-0000-abae-96a862120000 pid=4706->guuid=5879a213-1b00-0000-abae-96a8f6140000 pid=5366 execve guuid=368dd713-1b00-0000-abae-96a8f7140000 pid=5367 /usr/bin/dash guuid=01cc9787-1900-0000-abae-96a862120000 pid=4706->guuid=368dd713-1b00-0000-abae-96a8f7140000 pid=5367 execve guuid=97369e23-1b00-0000-abae-96a8fd140000 pid=5373 /usr/bin/dash guuid=01cc9787-1900-0000-abae-96a862120000 pid=4706->guuid=97369e23-1b00-0000-abae-96a8fd140000 pid=5373 execve guuid=13239124-1b00-0000-abae-96a8ff140000 pid=5375 /usr/bin/dash guuid=01cc9787-1900-0000-abae-96a862120000 pid=4706->guuid=13239124-1b00-0000-abae-96a8ff140000 pid=5375 execve guuid=09b07f25-1b00-0000-abae-96a801150000 pid=5377 /usr/bin/dash guuid=01cc9787-1900-0000-abae-96a862120000 pid=4706->guuid=09b07f25-1b00-0000-abae-96a801150000 pid=5377 execve guuid=a8f69a26-1b00-0000-abae-96a803150000 pid=5379 /usr/bin/dash guuid=01cc9787-1900-0000-abae-96a862120000 pid=4706->guuid=a8f69a26-1b00-0000-abae-96a803150000 pid=5379 execve guuid=01cc9787-1900-0000-abae-96a862120000 pid=5381 /tmp/dockerd delete-file write-file zombie guuid=01cc9787-1900-0000-abae-96a862120000 pid=4706->guuid=01cc9787-1900-0000-abae-96a862120000 pid=5381 clone guuid=b948dca9-1900-0000-abae-96a8d7120000 pid=4823 /usr/bin/systemctl guuid=7d41afa9-1900-0000-abae-96a8d5120000 pid=4821->guuid=b948dca9-1900-0000-abae-96a8d7120000 pid=4823 execve guuid=c94518aa-1900-0000-abae-96a8d9120000 pid=4825 /usr/bin/basename guuid=b948dca9-1900-0000-abae-96a8d7120000 pid=4823->guuid=c94518aa-1900-0000-abae-96a8d9120000 pid=4825 execve guuid=4a4d6faa-1900-0000-abae-96a8db120000 pid=4827 /usr/bin/basename guuid=b948dca9-1900-0000-abae-96a8d7120000 pid=4823->guuid=4a4d6faa-1900-0000-abae-96a8db120000 pid=4827 execve guuid=e756c9aa-1900-0000-abae-96a8de120000 pid=4830 /usr/bin/dash guuid=b948dca9-1900-0000-abae-96a8d7120000 pid=4823->guuid=e756c9aa-1900-0000-abae-96a8de120000 pid=4830 clone guuid=1e25d3aa-1900-0000-abae-96a8df120000 pid=4831 /usr/bin/systemctl guuid=e756c9aa-1900-0000-abae-96a8de120000 pid=4830->guuid=1e25d3aa-1900-0000-abae-96a8df120000 pid=4831 execve guuid=3ec6d6aa-1900-0000-abae-96a8e0120000 pid=4832 /usr/bin/sed guuid=e756c9aa-1900-0000-abae-96a8de120000 pid=4830->guuid=3ec6d6aa-1900-0000-abae-96a8e0120000 pid=4832 execve guuid=70cdfe11-1a00-0000-abae-96a867140000 pid=5223 /usr/bin/systemctl guuid=717dd211-1a00-0000-abae-96a866140000 pid=5222->guuid=70cdfe11-1a00-0000-abae-96a867140000 pid=5223 execve guuid=5158f112-1a00-0000-abae-96a868140000 pid=5224 /usr/lib/systemd/systemd-sysv-install guuid=70cdfe11-1a00-0000-abae-96a867140000 pid=5223->guuid=5158f112-1a00-0000-abae-96a868140000 pid=5224 execve guuid=606b4a13-1a00-0000-abae-96a869140000 pid=5225 /usr/bin/getopt guuid=5158f112-1a00-0000-abae-96a868140000 pid=5224->guuid=606b4a13-1a00-0000-abae-96a869140000 pid=5225 execve guuid=e0689c13-1a00-0000-abae-96a86a140000 pid=5226 /usr/sbin/update-rc.d guuid=5158f112-1a00-0000-abae-96a868140000 pid=5224->guuid=e0689c13-1a00-0000-abae-96a86a140000 pid=5226 execve guuid=1ea3fb5c-1a00-0000-abae-96a88b140000 pid=5259 /usr/sbin/update-rc.d guuid=5158f112-1a00-0000-abae-96a868140000 pid=5224->guuid=1ea3fb5c-1a00-0000-abae-96a88b140000 pid=5259 execve guuid=f5ec1118-1a00-0000-abae-96a86b140000 pid=5227 /usr/bin/systemctl guuid=e0689c13-1a00-0000-abae-96a86a140000 pid=5226->guuid=f5ec1118-1a00-0000-abae-96a86b140000 pid=5227 execve guuid=b0d0445e-1a00-0000-abae-96a88c140000 pid=5260 /usr/bin/systemctl guuid=1ea3fb5c-1a00-0000-abae-96a88b140000 pid=5259->guuid=b0d0445e-1a00-0000-abae-96a88c140000 pid=5260 execve guuid=4e324bb9-1a00-0000-abae-96a8b8140000 pid=5304 /usr/bin/systemctl guuid=202726b9-1a00-0000-abae-96a8b7140000 pid=5303->guuid=4e324bb9-1a00-0000-abae-96a8b8140000 pid=5304 execve guuid=82fe56ba-1a00-0000-abae-96a8ba140000 pid=5306 /usr/bin/systemctl guuid=563a35ba-1a00-0000-abae-96a8b9140000 pid=5305->guuid=82fe56ba-1a00-0000-abae-96a8ba140000 pid=5306 execve guuid=e333b8bb-1a00-0000-abae-96a8bc140000 pid=5308 /usr/bin/systemctl guuid=148490bb-1a00-0000-abae-96a8bb140000 pid=5307->guuid=e333b8bb-1a00-0000-abae-96a8bc140000 pid=5308 execve guuid=3c74b6ea-1a00-0000-abae-96a8d2140000 pid=5330 /usr/bin/systemctl guuid=a8d682ea-1a00-0000-abae-96a8d1140000 pid=5329->guuid=3c74b6ea-1a00-0000-abae-96a8d2140000 pid=5330 execve guuid=39b29811-1b00-0000-abae-96a8ef140000 pid=5359 /usr/sbin/sysctl write-file guuid=059c5e11-1b00-0000-abae-96a8ee140000 pid=5358->guuid=39b29811-1b00-0000-abae-96a8ef140000 pid=5359 execve guuid=a6c3ea14-1b00-0000-abae-96a8f8140000 pid=5368 /usr/sbin/xtables-nft-multi guuid=368dd713-1b00-0000-abae-96a8f7140000 pid=5367->guuid=a6c3ea14-1b00-0000-abae-96a8f8140000 pid=5368 execve guuid=bb19df23-1b00-0000-abae-96a8fe140000 pid=5374 /usr/sbin/xtables-nft-multi guuid=97369e23-1b00-0000-abae-96a8fd140000 pid=5373->guuid=bb19df23-1b00-0000-abae-96a8fe140000 pid=5374 execve guuid=f482e424-1b00-0000-abae-96a800150000 pid=5376 /usr/sbin/xtables-nft-multi guuid=13239124-1b00-0000-abae-96a8ff140000 pid=5375->guuid=f482e424-1b00-0000-abae-96a800150000 pid=5376 execve guuid=8fbfd925-1b00-0000-abae-96a802150000 pid=5378 /usr/sbin/xtables-nft-multi guuid=09b07f25-1b00-0000-abae-96a801150000 pid=5377->guuid=8fbfd925-1b00-0000-abae-96a802150000 pid=5378 execve guuid=2759f026-1b00-0000-abae-96a804150000 pid=5380 /usr/sbin/xtables-nft-multi guuid=a8f69a26-1b00-0000-abae-96a803150000 pid=5379->guuid=2759f026-1b00-0000-abae-96a804150000 pid=5380 execve guuid=66e8b5a0-1b00-0000-abae-96a806150000 pid=5382 /tmp/docker-daemon mprotect-exec guuid=01cc9787-1900-0000-abae-96a862120000 pid=5381->guuid=66e8b5a0-1b00-0000-abae-96a806150000 pid=5382 execve guuid=05056622-1e00-0000-abae-96a82c150000 pid=5420 /tmp/docker-daemon mprotect-exec guuid=01cc9787-1900-0000-abae-96a862120000 pid=5381->guuid=05056622-1e00-0000-abae-96a82c150000 pid=5420 execve guuid=97551c9e-2000-0000-abae-96a832150000 pid=5426 /tmp/docker-daemon mprotect-exec guuid=01cc9787-1900-0000-abae-96a862120000 pid=5381->guuid=97551c9e-2000-0000-abae-96a832150000 pid=5426 execve guuid=1ae02627-2300-0000-abae-96a838150000 pid=5432 /tmp/docker-daemon mprotect-exec guuid=01cc9787-1900-0000-abae-96a862120000 pid=5381->guuid=1ae02627-2300-0000-abae-96a838150000 pid=5432 execve guuid=ace140a4-2500-0000-abae-96a83e150000 pid=5438 /tmp/docker-daemon mprotect-exec guuid=01cc9787-1900-0000-abae-96a862120000 pid=5381->guuid=ace140a4-2500-0000-abae-96a83e150000 pid=5438 execve guuid=66e8b5a0-1b00-0000-abae-96a806150000 pid=5383 /tmp/docker-daemon guuid=66e8b5a0-1b00-0000-abae-96a806150000 pid=5382->guuid=66e8b5a0-1b00-0000-abae-96a806150000 pid=5383 clone guuid=66e8b5a0-1b00-0000-abae-96a806150000 pid=5384 /tmp/docker-daemon guuid=66e8b5a0-1b00-0000-abae-96a806150000 pid=5382->guuid=66e8b5a0-1b00-0000-abae-96a806150000 pid=5384 clone guuid=66e8b5a0-1b00-0000-abae-96a806150000 pid=5385 /tmp/docker-daemon guuid=66e8b5a0-1b00-0000-abae-96a806150000 pid=5382->guuid=66e8b5a0-1b00-0000-abae-96a806150000 pid=5385 clone guuid=66e8b5a0-1b00-0000-abae-96a806150000 pid=5386 /tmp/docker-daemon guuid=66e8b5a0-1b00-0000-abae-96a806150000 pid=5382->guuid=66e8b5a0-1b00-0000-abae-96a806150000 pid=5386 clone guuid=66e8b5a0-1b00-0000-abae-96a806150000 pid=5387 /tmp/docker-daemon guuid=66e8b5a0-1b00-0000-abae-96a806150000 pid=5382->guuid=66e8b5a0-1b00-0000-abae-96a806150000 pid=5387 clone guuid=05056622-1e00-0000-abae-96a82c150000 pid=5421 /tmp/docker-daemon guuid=05056622-1e00-0000-abae-96a82c150000 pid=5420->guuid=05056622-1e00-0000-abae-96a82c150000 pid=5421 clone guuid=05056622-1e00-0000-abae-96a82c150000 pid=5422 /tmp/docker-daemon guuid=05056622-1e00-0000-abae-96a82c150000 pid=5420->guuid=05056622-1e00-0000-abae-96a82c150000 pid=5422 clone guuid=05056622-1e00-0000-abae-96a82c150000 pid=5423 /tmp/docker-daemon guuid=05056622-1e00-0000-abae-96a82c150000 pid=5420->guuid=05056622-1e00-0000-abae-96a82c150000 pid=5423 clone guuid=05056622-1e00-0000-abae-96a82c150000 pid=5424 /tmp/docker-daemon guuid=05056622-1e00-0000-abae-96a82c150000 pid=5420->guuid=05056622-1e00-0000-abae-96a82c150000 pid=5424 clone guuid=05056622-1e00-0000-abae-96a82c150000 pid=5425 /tmp/docker-daemon guuid=05056622-1e00-0000-abae-96a82c150000 pid=5420->guuid=05056622-1e00-0000-abae-96a82c150000 pid=5425 clone guuid=97551c9e-2000-0000-abae-96a832150000 pid=5427 /tmp/docker-daemon guuid=97551c9e-2000-0000-abae-96a832150000 pid=5426->guuid=97551c9e-2000-0000-abae-96a832150000 pid=5427 clone guuid=97551c9e-2000-0000-abae-96a832150000 pid=5428 /tmp/docker-daemon guuid=97551c9e-2000-0000-abae-96a832150000 pid=5426->guuid=97551c9e-2000-0000-abae-96a832150000 pid=5428 clone guuid=97551c9e-2000-0000-abae-96a832150000 pid=5429 /tmp/docker-daemon guuid=97551c9e-2000-0000-abae-96a832150000 pid=5426->guuid=97551c9e-2000-0000-abae-96a832150000 pid=5429 clone guuid=97551c9e-2000-0000-abae-96a832150000 pid=5430 /tmp/docker-daemon guuid=97551c9e-2000-0000-abae-96a832150000 pid=5426->guuid=97551c9e-2000-0000-abae-96a832150000 pid=5430 clone guuid=97551c9e-2000-0000-abae-96a832150000 pid=5431 /tmp/docker-daemon guuid=97551c9e-2000-0000-abae-96a832150000 pid=5426->guuid=97551c9e-2000-0000-abae-96a832150000 pid=5431 clone guuid=1ae02627-2300-0000-abae-96a838150000 pid=5433 /tmp/docker-daemon guuid=1ae02627-2300-0000-abae-96a838150000 pid=5432->guuid=1ae02627-2300-0000-abae-96a838150000 pid=5433 clone guuid=1ae02627-2300-0000-abae-96a838150000 pid=5434 /tmp/docker-daemon guuid=1ae02627-2300-0000-abae-96a838150000 pid=5432->guuid=1ae02627-2300-0000-abae-96a838150000 pid=5434 clone guuid=1ae02627-2300-0000-abae-96a838150000 pid=5435 /tmp/docker-daemon guuid=1ae02627-2300-0000-abae-96a838150000 pid=5432->guuid=1ae02627-2300-0000-abae-96a838150000 pid=5435 clone guuid=1ae02627-2300-0000-abae-96a838150000 pid=5436 /tmp/docker-daemon guuid=1ae02627-2300-0000-abae-96a838150000 pid=5432->guuid=1ae02627-2300-0000-abae-96a838150000 pid=5436 clone guuid=1ae02627-2300-0000-abae-96a838150000 pid=5437 /tmp/docker-daemon guuid=1ae02627-2300-0000-abae-96a838150000 pid=5432->guuid=1ae02627-2300-0000-abae-96a838150000 pid=5437 clone guuid=ace140a4-2500-0000-abae-96a83e150000 pid=5439 /tmp/docker-daemon guuid=ace140a4-2500-0000-abae-96a83e150000 pid=5438->guuid=ace140a4-2500-0000-abae-96a83e150000 pid=5439 clone guuid=ace140a4-2500-0000-abae-96a83e150000 pid=5440 /tmp/docker-daemon guuid=ace140a4-2500-0000-abae-96a83e150000 pid=5438->guuid=ace140a4-2500-0000-abae-96a83e150000 pid=5440 clone guuid=ace140a4-2500-0000-abae-96a83e150000 pid=5441 /tmp/docker-daemon guuid=ace140a4-2500-0000-abae-96a83e150000 pid=5438->guuid=ace140a4-2500-0000-abae-96a83e150000 pid=5441 clone guuid=ace140a4-2500-0000-abae-96a83e150000 pid=5442 /tmp/docker-daemon guuid=ace140a4-2500-0000-abae-96a83e150000 pid=5438->guuid=ace140a4-2500-0000-abae-96a83e150000 pid=5442 clone guuid=ace140a4-2500-0000-abae-96a83e150000 pid=5443 /tmp/docker-daemon guuid=ace140a4-2500-0000-abae-96a83e150000 pid=5438->guuid=ace140a4-2500-0000-abae-96a83e150000 pid=5443 clone
Gathering data
Result
Threat name:
Detection:
malicious
Classification:
troj.evad.mine
Score:
88 / 100
Signature
Executes the "crontab" command typically for achieving persistence
Executes the "iptables" command to insert, remove and/or manipulate rules
Found strings related to Crypto-Mining
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Sample deletes itself
Sample reads /proc/mounts (often used for finding a writable filesystem)
Sample tries to persist itself using System V runlevels
Yara detected Xmrig cryptocurrency miner
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1820714 Sample: bot.elf Startdate: 25/11/2025 Architecture: LINUX Score: 88 87 169.254.169.254, 80 USDOSUS Reserved 2->87 89 195.24.237.46, 45696, 45700, 45704 NTI-AS9MaiBlocB11ScaraDEtaj2Ap67RO Romania 2->89 91 4 other IPs or domains 2->91 95 Malicious sample detected (through community Yara rule) 2->95 97 Multi AV Scanner detection for submitted file 2->97 99 Yara detected Xmrig cryptocurrency miner 2->99 101 Found strings related to Crypto-Mining 2->101 12 bot.elf 2->12         started        14 dash rm 2->14         started        16 dash rm 2->16         started        18 6 other processes 2->18 signatures3 process4 process5 20 bot.elf 12->20         started        file6 83 /usr/local/bin/systemhelper, ELF 20->83 dropped 85 /tmp/docker-daemon, ELF 20->85 dropped 103 Sample deletes itself 20->103 105 Sample reads /proc/mounts (often used for finding a writable filesystem) 20->105 24 bot.elf sh 20->24         started        26 bot.elf sh 20->26         started        28 bot.elf sh 20->28         started        30 24 other processes 20->30 signatures7 process8 process9 32 sh ufw 24->32         started        34 sh ufw 26->34         started        36 sh systemctl 28->36         started        38 sh crontab 30->38         started        41 sh iptables 30->41         started        43 sh iptables 30->43         started        45 10 other processes 30->45 signatures10 47 ufw iptables 32->47         started        50 ufw iptables 32->50         started        52 ufw iptables 32->52         started        60 8 other processes 32->60 54 ufw iptables 34->54         started        56 ufw iptables 34->56         started        62 9 other processes 34->62 58 systemctl systemd-sysv-install 36->58         started        107 Executes the "crontab" command typically for achieving persistence 38->107 109 Executes the "iptables" command to insert, remove and/or manipulate rules 41->109 64 5 other processes 45->64 process11 signatures12 111 Executes the "iptables" command to insert, remove and/or manipulate rules 47->111 66 systemd-sysv-install update-rc.d 58->66         started        69 systemd-sysv-install update-rc.d 58->69         started        71 systemd-sysv-install getopt 58->71         started        73 ip6tables modprobe 60->73         started        75 service systemctl 64->75         started        77 service sed 64->77         started        process13 signatures14 93 Sample tries to persist itself using System V runlevels 66->93 79 update-rc.d systemctl 66->79         started        81 update-rc.d systemctl 69->81         started        process15
Threat name:
Linux.Coinminer.Generic
Status:
Malicious
First seen:
2025-11-25 17:34:17 UTC
File Type:
ELF64 Little (SO)
AV detection:
13 of 24 (54.17%)
Threat level:
  4/5
Result
Malware family:
Score:
  10/10
Tags:
family:xmrig antivm defense_evasion discovery exection execution linux miner persistence privilege_escalation rootkit
Behaviour
Enumerates kernel/hardware configuration
Reads runtime system information
System Network Configuration Discovery
Writes file to tmp directory
Changes its process name
Checks CPU configuration
Reads CPU attributes
Checks hardware identifiers (DMI)
Creates/modifies Cron job
Disables AppArmor
Disables SELinux
Enumerates running processes
Modifies init.d
Reads hardware information
Write file to user bin folder
Executes dropped EXE
Loads a kernel module
Modifies hosts file
Renames itself
Modifies the dynamic linker configuration file
XMRig Miner payload
Xmrig family
xmrig
Verdict:
Unknown
Tags:
cryptojacking xmrig
YARA:
MacOS_Cryptominer_Xmrig_241780a1 XMRIG_Monero_Miner MAL_ELF_XMRig_Jul_09
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:BLOWFISH_Constants
Author:phoul (@phoul)
Description:Look for Blowfish constants
Rule name:CP_Script_Inject_Detector
Author:DiegoAnalytics
Description:Detects attempts to inject code into another process across PE, ELF, Mach-O binaries
Rule name:DetectEncryptedVariants
Author:Zinyth
Description:Detects 'encrypted' in ASCII, Unicode, base64, or hex-encoded
Rule name:enterpriseapps2
Author:Tim Brown @timb_machine
Description:Enterprise apps
Rule name:F01_s1ckrule
Author:s1ckb017
Rule name:ldpreload
Author:xorseed
Reference:https://stuff.rop.io/
Rule name:Linux_Trojan_Pornoasset_927f314f
Author:Elastic Security
Rule name:MacOS_Cryptominer_Xmrig_241780a1
Author:Elastic Security
Rule name:MD5_Constants
Author:phoul (@phoul)
Description:Look for MD5 constants
Rule name:Multi_Cryptominer_Xmrig_f9516741
Author:Elastic Security
Rule name:ProgramLanguage_Rust
Author:albertzsigovits
Description:Application written in Rust programming language
Rule name:RANSOMWARE
Author:ToroGuitar
Rule name:RIPEMD160_Constants
Author:phoul (@phoul)
Description:Look for RIPEMD-160 constants
Rule name:Rustyloader_mem_loose
Author:James_inthe_box
Description:Corroded buerloader
Reference:https://app.any.run/tasks/83064edd-c7eb-4558-85e8-621db72b2a24
Rule name:setsockopt
Author:Tim Brown @timb_machine
Description:Hunts for setsockopt() red flags
Rule name:SHA1_Constants
Author:phoul (@phoul)
Description:Look for SHA1 constants
Rule name:SHA512_Constants
Author:phoul (@phoul)
Description:Look for SHA384/SHA512 constants
Rule name:unixredflags3
Author:Tim Brown @timb_machine
Description:Hunts for UNIX red flags
Rule name:WHIRLPOOL_Constants
Author:phoul (@phoul)
Description:Look for WhirlPool constants
Rule name:XMRIG_Monero_Miner
Author:Florian Roth (Nextron Systems)
Description:Detects Monero mining software
Reference:https://github.com/xmrig/xmrig/releases
Rule name:xmrig_v1
Author:RandomMalware

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

elf 85fb4996fd46b91bda84aae63acad45d0d5784782d09fbf5141aeb426a2ca5c6

(this sample)

  
Delivery method
Distributed via web download

Comments