MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 8704e88601ef5f71f2843dacbf7d373c9de68abce5f6961009e86cdc7dbb8b35. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 9


Intelligence 9 IOCs YARA 3 File information Comments

SHA256 hash: 8704e88601ef5f71f2843dacbf7d373c9de68abce5f6961009e86cdc7dbb8b35
SHA3-384 hash: 667d97b567def6999f1cb9c2fb78c3be3d88b42e758e58ebd086ecdfe253b2950dc3b74136ac7cac943ad8d43b1f01c4
SHA1 hash: 4c409ef485fc3ba3fa70e457172c94b07d0eb3a9
MD5 hash: 995f2980c6f8dcb140e7d5c5f0ad6bd1
humanhash: crazy-cup-table-cold
File name:irannet.armv5l
Download: download sample
Signature Mirai
File size:58'664 bytes
First seen:2025-11-30 06:16:43 UTC
Last seen:Never
File type: elf
MIME type:application/x-executable
ssdeep 1536:pcrJmEqTPgililLupgYDJVcRuBQTkZn+qVzw:2KZ6SgYDJVLacvVs
TLSH T133430221F0B54EB8D2B238BF7931C54401A6E476E365240B13C68FEE74A958C9BE02F7
TrID 50.1% (.) ELF Executable and Linkable format (Linux) (4022/12)
49.8% (.O) ELF Executable and Linkable format (generic) (4000/1)
Magika elf
Reporter abuse_ch
Tags:elf mirai UPX
File size (compressed) :58'664 bytes
File size (de-compressed) :152'408 bytes
Format:linux/arm
Unpacked file: 7a6139af7dca3c5e62d8a8db7430c7781da6d0138e5a21a3ddc66ae31fb9ec6b

Intelligence


File Origin
# of uploads :
1
# of downloads :
57
Origin country :
DE DE
Vendor Threat Intelligence
Details
No details
Result
Verdict:
Clean
Maliciousness:
Verdict:
Unknown
Threat level:
  2.5/10
Confidence:
100%
Tags:
android mirai packed upx
Verdict:
Malicious
Uses P2P?:
false
Uses anti-vm?:
false
Architecture:
arm
Packer:
UPX
Botnet:
unknown
Number of open files:
270
Number of processes launched:
5
Processes remaning?
true
Remote TCP ports scanned:
not identified
Behaviour
Persistence
Process Renaming
Information Gathering
Botnet C2s
TCP botnet C2(s):
not identified
UDP botnet C2(s):
not identified
Result
Gathering data
Verdict:
Unknown
File Type:
elf.32.le
First seen:
2025-11-29T23:17:00Z UTC
Last seen:
2025-11-30T01:59:00Z UTC
Hits:
~10
Result
Threat name:
Detection:
malicious
Classification:
troj.evad
Score:
76 / 100
Signature
Drops files in suspicious directories
Multi AV Scanner detection for submitted file
Sample is packed with UPX
Sample tries to set files in /etc globally writable
Yara detected Mirai
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1823028 Sample: irannet.armv5l.elf Startdate: 30/11/2025 Architecture: LINUX Score: 76 23 169.254.169.254, 80 USDOSUS Reserved 2->23 25 185.158.107.249, 59516, 59518, 59520 ASDETUKhttpwwwheficedcomGB Germany 2->25 27 daisy.ubuntu.com 2->27 33 Multi AV Scanner detection for submitted file 2->33 35 Yara detected Mirai 2->35 37 Sample is packed with UPX 2->37 9 irannet.armv5l.elf 2->9         started        11 python3.8 dpkg 2->11         started        signatures3 process4 process5 13 irannet.armv5l.elf 9->13         started        process6 15 irannet.armv5l.elf 13->15         started        file7 21 /etc/init.d/main, POSIX 15->21 dropped 29 Sample tries to set files in /etc globally writable 15->29 31 Drops files in suspicious directories 15->31 19 irannet.armv5l.elf 15->19         started        signatures8 process9
Threat name:
Linux.Trojan.Svirtu
Status:
Malicious
First seen:
2025-11-29 19:40:23 UTC
File Type:
ELF32 Little (Exe)
AV detection:
15 of 36 (41.67%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  5/10
Tags:
upx
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:linux_generic_ipv6_catcher
Author:@_lubiedo
Description:ELF samples using IPv6 addresses
Rule name:SUSP_ELF_LNX_UPX_Compressed_File
Author:Florian Roth (Nextron Systems)
Description:Detects a suspicious ELF binary with UPX compression
Reference:Internal Research
Rule name:upx_packed_elf_v1
Author:RandomMalware

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

elf 8704e88601ef5f71f2843dacbf7d373c9de68abce5f6961009e86cdc7dbb8b35

(this sample)

  
Delivery method
Distributed via web download

Comments