MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 89bd41c144b026ab5628d906917c5bb897e408d642ef6ff7e10beb9b34e9f620. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 12


Intelligence 12 IOCs YARA 6 File information Comments

SHA256 hash: 89bd41c144b026ab5628d906917c5bb897e408d642ef6ff7e10beb9b34e9f620
SHA3-384 hash: dcc3d4d184821ca194725ec92b8d45e82f6e5bc5cadb20aba8129dca1cde85244a53895e1af3f7ab0b6b2585408484d8
SHA1 hash: 68c5600625d1329fc6b30a16dcd6307dfb215a29
MD5 hash: aee562b9514284c69256cf4d276ade21
humanhash: sodium-pip-neptune-monkey
File name:x86
Download: download sample
Signature Mirai
File size:131'504 bytes
First seen:2025-09-18 21:49:17 UTC
Last seen:2025-09-19 22:11:22 UTC
File type: elf
MIME type:application/x-executable
ssdeep 3072:rlQxqafzXXwvLtnKgPjV/vwXjTaOyZKQpv0Lc:JazXAhXoz2Ospv0Lc
TLSH T14AD35C84B7C2D0F2E55311F12026CB675732E63AA066DA5BE3796D39FC36500CA26B7C
telfhash t1357117f62ef90ddcb7d19805d24e5b925e0de63f39103aa70662552023b7f82927bc38
TrID 50.1% (.) ELF Executable and Linkable format (Linux) (4022/12)
49.8% (.O) ELF Executable and Linkable format (generic) (4000/1)
Magika elf
Reporter abuse_ch
Tags:elf mirai

Intelligence


File Origin
# of uploads :
3
# of downloads :
56
Origin country :
DE DE
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
DNS request
Receives data from a server
Runs as daemon
Opens a port
Sends data to a server
Connection attempt
Substitutes an application name
Deleting of the original file
Verdict:
Malicious
Uses P2P?:
false
Uses anti-vm?:
false
Architecture:
x86
Packer:
not packed
Botnet:
unknown
Number of open files:
5
Number of processes launched:
5
Processes remaning?
true
Remote TCP ports scanned:
not identified
Behaviour
Process Renaming
Information Gathering
Botnet C2s
TCP botnet C2(s):
not identified
UDP botnet C2(s):
not identified
Status:
terminated
Behavior Graph:
%3 guuid=43b9dea4-1a00-0000-6a28-c3be66140000 pid=5222 /usr/bin/sudo guuid=bf7403a8-1a00-0000-6a28-c3be67140000 pid=5223 /tmp/sample.bin delete-file guuid=43b9dea4-1a00-0000-6a28-c3be66140000 pid=5222->guuid=bf7403a8-1a00-0000-6a28-c3be67140000 pid=5223 execve guuid=4e4ab7a8-1a00-0000-6a28-c3be68140000 pid=5224 /tmp/sample.bin guuid=bf7403a8-1a00-0000-6a28-c3be67140000 pid=5223->guuid=4e4ab7a8-1a00-0000-6a28-c3be68140000 pid=5224 clone guuid=2e1abea8-1a00-0000-6a28-c3be69140000 pid=5225 /tmp/sample.bin zombie guuid=bf7403a8-1a00-0000-6a28-c3be67140000 pid=5223->guuid=2e1abea8-1a00-0000-6a28-c3be69140000 pid=5225 clone guuid=e138c3a8-1a00-0000-6a28-c3be6a140000 pid=5226 /tmp/sample.bin dns net send-data zombie guuid=bf7403a8-1a00-0000-6a28-c3be67140000 pid=5223->guuid=e138c3a8-1a00-0000-6a28-c3be6a140000 pid=5226 clone 69e3eade-acae-5a5a-b527-3b224017b69e 168.235.111.72:53 guuid=e138c3a8-1a00-0000-6a28-c3be6a140000 pid=5226->69e3eade-acae-5a5a-b527-3b224017b69e send: 38B 13a9ec37-224a-5659-ad3f-0bbe92e29ad2 bot.federalagent.xyz:11959 guuid=e138c3a8-1a00-0000-6a28-c3be6a140000 pid=5226->13a9ec37-224a-5659-ad3f-0bbe92e29ad2 send: 11B
Result
Threat name:
Detection:
malicious
Classification:
troj.evad
Score:
84 / 100
Signature
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Performs DNS queries to domains with low reputation
Sample deletes itself
Sample reads /proc/mounts (often used for finding a writable filesystem)
Suricata IDS alerts for network traffic
Yara detected Gafgyt
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1780398 Sample: x86.elf Startdate: 18/09/2025 Architecture: LINUX Score: 84 26 bot.federalagent.xyz 2->26 28 bot.federalagent.xyz 23.132.228.76, 14979, 35060 WHOLESAIL-NOEL-ASNUS Reserved 2->28 30 4 other IPs or domains 2->30 32 Suricata IDS alerts for network traffic 2->32 34 Malicious sample detected (through community Yara rule) 2->34 36 Multi AV Scanner detection for submitted file 2->36 38 Yara detected Gafgyt 2->38 8 dash rm x86.elf 2->8         started        11 udisksd dumpe2fs 2->11         started        13 dash rm 2->13         started        15 9 other processes 2->15 signatures3 40 Performs DNS queries to domains with low reputation 26->40 process4 signatures5 44 Sample deletes itself 8->44 17 x86.elf 8->17         started        19 x86.elf 8->19         started        21 x86.elf 8->21         started        process6 process7 23 x86.elf 17->23         started        signatures8 42 Sample reads /proc/mounts (often used for finding a writable filesystem) 23->42
Threat name:
Linux.Worm.Mirai
Status:
Malicious
First seen:
2025-09-18 21:50:54 UTC
File Type:
ELF32 Little (Exe)
AV detection:
15 of 24 (62.50%)
Threat level:
  5/5
Result
Malware family:
hailbot
Score:
  10/10
Tags:
family:hailbot discovery linux
Behaviour
Reads runtime system information
Changes its process name
Deletes itself
Unexpected DNS network traffic destination
Verdict:
Malicious
Tags:
trojan mirai gafgyt Unix.Trojan.Mirai-9441505-0
YARA:
Linux_Trojan_Gafgyt_5bf62ce4 Linux_Trojan_Mirai_389ee3e9
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:CP_AllMal_Detector
Author:DiegoAnalytics
Description:CrossPlatform All Malwares Detector: Detect PE, ELF, Mach-O, scripts, archives; overlay, obfuscation, encryption, spoofing, hiding, high entropy, network communication
Rule name:ELF_Mirai
Author:NDA0E
Description:Detects multiple Mirai variants
Rule name:linux_generic_ipv6_catcher
Author:@_lubiedo
Description:ELF samples using IPv6 addresses
Rule name:Linux_Trojan_Gafgyt_5bf62ce4
Author:Elastic Security
Rule name:Linux_Trojan_Mirai_389ee3e9
Author:Elastic Security
Rule name:unixredflags3
Author:Tim Brown @timb_machine
Description:Hunts for UNIX red flags

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

elf 89bd41c144b026ab5628d906917c5bb897e408d642ef6ff7e10beb9b34e9f620

(this sample)

  
Delivery method
Distributed via web download

Comments