MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 8ab5de147cccce1eccea9bd3503b08710b02605951c0c75554b53e492976038a. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 13


Intelligence 13 IOCs YARA 18 File information Comments

SHA256 hash: 8ab5de147cccce1eccea9bd3503b08710b02605951c0c75554b53e492976038a
SHA3-384 hash: e38e8987be9f97f55e26237d3eead5f9a4c4bd7ca69e6a3c4f20de1ca1f911cb378378778a3dcef9f9b1a5fdd5e8871b
SHA1 hash: ee3318e2e31984b1f5ebd972b202cb213b99eb0c
MD5 hash: 51b69ba4c49a2ee9c8c42bc4077faf83
humanhash: muppet-london-diet-equal
File name:i586
Download: download sample
Signature Mirai
File size:323'819 bytes
First seen:2025-07-14 11:28:18 UTC
Last seen:Never
File type: elf
MIME type:application/x-executable
ssdeep 3072:Rbas6/LJOU+CF0l+hzUnR/WCxlKwjoSiJaNnHmXFvtMdxDaJaT:RbaS7CC4ahxQwjoNwBmXFvtMdxDaJaT
TLSH T1E5647233991584A1E0204CB3226777469C47D7BF88E726D3EE5A59B0FF3441B92BAEC1
telfhash t11931661194355a182fb3d924acbc57f31622172723582e716f26c0cc44370e2ea39d0f
TrID 50.1% (.) ELF Executable and Linkable format (Linux) (4022/12)
49.8% (.O) ELF Executable and Linkable format (generic) (4000/1)
Magika elf
Reporter abuse_ch
Tags:elf gafgyt mirai

Intelligence


File Origin
# of uploads :
1
# of downloads :
19
Origin country :
DE DE
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Removes directories from a subdirectory of a temporary directory
Launching a process
Removes directories
Deletes a file
Removes directories from a temporary directory
Connection attempt
Deleting a recently created file
Substitutes an application name
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
explorer gcc lolbin obfuscated remote
Verdict:
Malicious
Uses P2P?:
false
Uses anti-vm?:
false
Architecture:
x86
Packer:
not packed
Botnet:
unknown
Number of open files:
4
Number of processes launched:
5
Processes remaning?
true
Remote TCP ports scanned:
not identified
Behaviour
Process Renaming
Botnet C2s
TCP botnet C2(s):
type:Gafgyt 213.232.114.169:180
UDP botnet C2(s):
not identified
Status:
terminated
Behavior Graph:
%3 guuid=f2a09eb0-1900-0000-3dd1-524159090000 pid=2393 /usr/bin/sudo guuid=cdd1a4b2-1900-0000-3dd1-52415a090000 pid=2394 /tmp/sample.bin net guuid=f2a09eb0-1900-0000-3dd1-524159090000 pid=2393->guuid=cdd1a4b2-1900-0000-3dd1-52415a090000 pid=2394 execve 8b0a01dc-0728-52c1-8024-c4ba7801b8d6 8.8.8.8:53 guuid=cdd1a4b2-1900-0000-3dd1-52415a090000 pid=2394->8b0a01dc-0728-52c1-8024-c4ba7801b8d6 con guuid=3b15bfb3-1900-0000-3dd1-52415b090000 pid=2395 /tmp/sample.bin zombie guuid=cdd1a4b2-1900-0000-3dd1-52415a090000 pid=2394->guuid=3b15bfb3-1900-0000-3dd1-52415b090000 pid=2395 clone guuid=6ecdc5b3-1900-0000-3dd1-52415c090000 pid=2396 /usr/bin/dash guuid=cdd1a4b2-1900-0000-3dd1-52415a090000 pid=2394->guuid=6ecdc5b3-1900-0000-3dd1-52415c090000 pid=2396 execve guuid=2a4bdcb4-1900-0000-3dd1-524161090000 pid=2401 /usr/bin/dash guuid=cdd1a4b2-1900-0000-3dd1-52415a090000 pid=2394->guuid=2a4bdcb4-1900-0000-3dd1-524161090000 pid=2401 execve guuid=bdbb5eb7-1900-0000-3dd1-524164090000 pid=2404 /usr/bin/dash guuid=cdd1a4b2-1900-0000-3dd1-52415a090000 pid=2394->guuid=bdbb5eb7-1900-0000-3dd1-524164090000 pid=2404 execve guuid=29d9d2b7-1900-0000-3dd1-524169090000 pid=2409 /usr/bin/dash guuid=cdd1a4b2-1900-0000-3dd1-52415a090000 pid=2394->guuid=29d9d2b7-1900-0000-3dd1-524169090000 pid=2409 execve guuid=64cc73b8-1900-0000-3dd1-52416e090000 pid=2414 /usr/bin/dash guuid=cdd1a4b2-1900-0000-3dd1-52415a090000 pid=2394->guuid=64cc73b8-1900-0000-3dd1-52416e090000 pid=2414 execve guuid=3203d6b8-1900-0000-3dd1-524174090000 pid=2420 /usr/bin/dash guuid=cdd1a4b2-1900-0000-3dd1-52415a090000 pid=2394->guuid=3203d6b8-1900-0000-3dd1-524174090000 pid=2420 execve guuid=5b5a65b9-1900-0000-3dd1-52417b090000 pid=2427 /usr/bin/dash guuid=cdd1a4b2-1900-0000-3dd1-52415a090000 pid=2394->guuid=5b5a65b9-1900-0000-3dd1-52417b090000 pid=2427 execve guuid=1c94e7b9-1900-0000-3dd1-524182090000 pid=2434 /usr/bin/dash guuid=cdd1a4b2-1900-0000-3dd1-52415a090000 pid=2394->guuid=1c94e7b9-1900-0000-3dd1-524182090000 pid=2434 execve guuid=ddf368ba-1900-0000-3dd1-524188090000 pid=2440 /usr/bin/dash guuid=cdd1a4b2-1900-0000-3dd1-52415a090000 pid=2394->guuid=ddf368ba-1900-0000-3dd1-524188090000 pid=2440 execve guuid=c3f5ebba-1900-0000-3dd1-52418e090000 pid=2446 /usr/bin/dash guuid=cdd1a4b2-1900-0000-3dd1-52415a090000 pid=2394->guuid=c3f5ebba-1900-0000-3dd1-52418e090000 pid=2446 execve guuid=94d17cbb-1900-0000-3dd1-524193090000 pid=2451 /usr/bin/dash guuid=cdd1a4b2-1900-0000-3dd1-52415a090000 pid=2394->guuid=94d17cbb-1900-0000-3dd1-524193090000 pid=2451 execve guuid=0e39d9bb-1900-0000-3dd1-524198090000 pid=2456 /usr/bin/dash guuid=cdd1a4b2-1900-0000-3dd1-52415a090000 pid=2394->guuid=0e39d9bb-1900-0000-3dd1-524198090000 pid=2456 execve guuid=cff840bc-1900-0000-3dd1-52419c090000 pid=2460 /usr/bin/dash guuid=cdd1a4b2-1900-0000-3dd1-52415a090000 pid=2394->guuid=cff840bc-1900-0000-3dd1-52419c090000 pid=2460 execve guuid=8699c0bc-1900-0000-3dd1-52419f090000 pid=2463 /tmp/sample.bin guuid=cdd1a4b2-1900-0000-3dd1-52415a090000 pid=2394->guuid=8699c0bc-1900-0000-3dd1-52419f090000 pid=2463 clone guuid=1da9c5bc-1900-0000-3dd1-5241a0090000 pid=2464 /tmp/sample.bin guuid=cdd1a4b2-1900-0000-3dd1-52415a090000 pid=2394->guuid=1da9c5bc-1900-0000-3dd1-5241a0090000 pid=2464 clone guuid=07e9cab3-1900-0000-3dd1-52415d090000 pid=2397 /usr/bin/dash guuid=3b15bfb3-1900-0000-3dd1-52415b090000 pid=2395->guuid=07e9cab3-1900-0000-3dd1-52415d090000 pid=2397 execve guuid=a370d9b4-1900-0000-3dd1-524160090000 pid=2400 /usr/bin/dash guuid=3b15bfb3-1900-0000-3dd1-52415b090000 pid=2395->guuid=a370d9b4-1900-0000-3dd1-524160090000 pid=2400 execve guuid=3eb060b7-1900-0000-3dd1-524165090000 pid=2405 /usr/bin/dash guuid=3b15bfb3-1900-0000-3dd1-52415b090000 pid=2395->guuid=3eb060b7-1900-0000-3dd1-524165090000 pid=2405 execve guuid=0147d4b7-1900-0000-3dd1-52416a090000 pid=2410 /usr/bin/dash guuid=3b15bfb3-1900-0000-3dd1-52415b090000 pid=2395->guuid=0147d4b7-1900-0000-3dd1-52416a090000 pid=2410 execve guuid=25cf6eb8-1900-0000-3dd1-52416d090000 pid=2413 /usr/bin/dash guuid=3b15bfb3-1900-0000-3dd1-52415b090000 pid=2395->guuid=25cf6eb8-1900-0000-3dd1-52416d090000 pid=2413 execve guuid=a59dc0b8-1900-0000-3dd1-524173090000 pid=2419 /usr/bin/dash guuid=3b15bfb3-1900-0000-3dd1-52415b090000 pid=2395->guuid=a59dc0b8-1900-0000-3dd1-524173090000 pid=2419 execve guuid=7a3e29b9-1900-0000-3dd1-524178090000 pid=2424 /usr/bin/dash guuid=3b15bfb3-1900-0000-3dd1-52415b090000 pid=2395->guuid=7a3e29b9-1900-0000-3dd1-524178090000 pid=2424 execve guuid=794a82b9-1900-0000-3dd1-52417d090000 pid=2429 /usr/bin/dash guuid=3b15bfb3-1900-0000-3dd1-52415b090000 pid=2395->guuid=794a82b9-1900-0000-3dd1-52417d090000 pid=2429 execve guuid=472dd5b9-1900-0000-3dd1-524181090000 pid=2433 /usr/bin/dash guuid=3b15bfb3-1900-0000-3dd1-52415b090000 pid=2395->guuid=472dd5b9-1900-0000-3dd1-524181090000 pid=2433 execve guuid=5f572bba-1900-0000-3dd1-524186090000 pid=2438 /usr/bin/dash guuid=3b15bfb3-1900-0000-3dd1-52415b090000 pid=2395->guuid=5f572bba-1900-0000-3dd1-524186090000 pid=2438 execve guuid=e72d84ba-1900-0000-3dd1-524189090000 pid=2441 /usr/bin/dash guuid=3b15bfb3-1900-0000-3dd1-52415b090000 pid=2395->guuid=e72d84ba-1900-0000-3dd1-524189090000 pid=2441 execve guuid=46f018bb-1900-0000-3dd1-524190090000 pid=2448 /usr/bin/dash guuid=3b15bfb3-1900-0000-3dd1-52415b090000 pid=2395->guuid=46f018bb-1900-0000-3dd1-524190090000 pid=2448 execve guuid=b6b0e7bb-1900-0000-3dd1-524199090000 pid=2457 /usr/bin/dash guuid=3b15bfb3-1900-0000-3dd1-52415b090000 pid=2395->guuid=b6b0e7bb-1900-0000-3dd1-524199090000 pid=2457 execve guuid=779efeef-2000-0000-3dd1-524133100000 pid=4147 /tmp/sample.bin guuid=3b15bfb3-1900-0000-3dd1-52415b090000 pid=2395->guuid=779efeef-2000-0000-3dd1-524133100000 pid=4147 clone guuid=6b9908f0-2000-0000-3dd1-524134100000 pid=4148 /tmp/sample.bin guuid=3b15bfb3-1900-0000-3dd1-52415b090000 pid=2395->guuid=6b9908f0-2000-0000-3dd1-524134100000 pid=4148 clone guuid=b01c40b4-1900-0000-3dd1-52415f090000 pid=2399 /usr/bin/rm delete-file guuid=6ecdc5b3-1900-0000-3dd1-52415c090000 pid=2396->guuid=b01c40b4-1900-0000-3dd1-52415f090000 pid=2399 execve guuid=e26b32b4-1900-0000-3dd1-52415e090000 pid=2398 /usr/bin/rm guuid=07e9cab3-1900-0000-3dd1-52415d090000 pid=2397->guuid=e26b32b4-1900-0000-3dd1-52415e090000 pid=2398 execve guuid=57101eb5-1900-0000-3dd1-524162090000 pid=2402 /usr/bin/rm delete-file guuid=a370d9b4-1900-0000-3dd1-524160090000 pid=2400->guuid=57101eb5-1900-0000-3dd1-524162090000 pid=2402 execve guuid=a5561eb5-1900-0000-3dd1-524163090000 pid=2403 /usr/bin/rm delete-file guuid=2a4bdcb4-1900-0000-3dd1-524161090000 pid=2401->guuid=a5561eb5-1900-0000-3dd1-524163090000 pid=2403 execve guuid=62b797b7-1900-0000-3dd1-524167090000 pid=2407 /usr/bin/rm guuid=bdbb5eb7-1900-0000-3dd1-524164090000 pid=2404->guuid=62b797b7-1900-0000-3dd1-524167090000 pid=2407 execve guuid=74838cb7-1900-0000-3dd1-524166090000 pid=2406 /usr/bin/rm guuid=3eb060b7-1900-0000-3dd1-524165090000 pid=2405->guuid=74838cb7-1900-0000-3dd1-524166090000 pid=2406 execve guuid=a8c700b8-1900-0000-3dd1-52416c090000 pid=2412 /usr/bin/rm delete-file guuid=29d9d2b7-1900-0000-3dd1-524169090000 pid=2409->guuid=a8c700b8-1900-0000-3dd1-52416c090000 pid=2412 execve guuid=951afdb7-1900-0000-3dd1-52416b090000 pid=2411 /usr/bin/rm delete-file guuid=0147d4b7-1900-0000-3dd1-52416a090000 pid=2410->guuid=951afdb7-1900-0000-3dd1-52416b090000 pid=2411 execve guuid=7e3d94b8-1900-0000-3dd1-524170090000 pid=2416 /usr/bin/rm guuid=25cf6eb8-1900-0000-3dd1-52416d090000 pid=2413->guuid=7e3d94b8-1900-0000-3dd1-524170090000 pid=2416 execve guuid=a4b99cb8-1900-0000-3dd1-524171090000 pid=2417 /usr/bin/rm guuid=64cc73b8-1900-0000-3dd1-52416e090000 pid=2414->guuid=a4b99cb8-1900-0000-3dd1-524171090000 pid=2417 execve guuid=4b2cfbb8-1900-0000-3dd1-524176090000 pid=2422 /usr/bin/rm delete-file guuid=a59dc0b8-1900-0000-3dd1-524173090000 pid=2419->guuid=4b2cfbb8-1900-0000-3dd1-524176090000 pid=2422 execve guuid=3e9816b9-1900-0000-3dd1-524177090000 pid=2423 /usr/bin/rm guuid=3203d6b8-1900-0000-3dd1-524174090000 pid=2420->guuid=3e9816b9-1900-0000-3dd1-524177090000 pid=2423 execve guuid=e66b50b9-1900-0000-3dd1-52417a090000 pid=2426 /usr/bin/rm guuid=7a3e29b9-1900-0000-3dd1-524178090000 pid=2424->guuid=e66b50b9-1900-0000-3dd1-52417a090000 pid=2426 execve guuid=3401a2b9-1900-0000-3dd1-52417e090000 pid=2430 /usr/bin/rm guuid=5b5a65b9-1900-0000-3dd1-52417b090000 pid=2427->guuid=3401a2b9-1900-0000-3dd1-52417e090000 pid=2430 execve guuid=6435a9b9-1900-0000-3dd1-52417f090000 pid=2431 /usr/bin/rm guuid=794a82b9-1900-0000-3dd1-52417d090000 pid=2429->guuid=6435a9b9-1900-0000-3dd1-52417f090000 pid=2431 execve guuid=111bfdb9-1900-0000-3dd1-524183090000 pid=2435 /usr/bin/rm guuid=472dd5b9-1900-0000-3dd1-524181090000 pid=2433->guuid=111bfdb9-1900-0000-3dd1-524183090000 pid=2435 execve guuid=8a7a25ba-1900-0000-3dd1-524185090000 pid=2437 /usr/bin/rm guuid=1c94e7b9-1900-0000-3dd1-524182090000 pid=2434->guuid=8a7a25ba-1900-0000-3dd1-524185090000 pid=2437 execve guuid=ded559ba-1900-0000-3dd1-524187090000 pid=2439 /usr/bin/rm guuid=5f572bba-1900-0000-3dd1-524186090000 pid=2438->guuid=ded559ba-1900-0000-3dd1-524187090000 pid=2439 execve guuid=b6dd9fba-1900-0000-3dd1-52418b090000 pid=2443 /usr/bin/rm guuid=ddf368ba-1900-0000-3dd1-524188090000 pid=2440->guuid=b6dd9fba-1900-0000-3dd1-52418b090000 pid=2443 execve guuid=3959c8ba-1900-0000-3dd1-52418d090000 pid=2445 /usr/bin/rm delete-file guuid=e72d84ba-1900-0000-3dd1-524189090000 pid=2441->guuid=3959c8ba-1900-0000-3dd1-52418d090000 pid=2445 execve guuid=d9e42dbb-1900-0000-3dd1-524191090000 pid=2449 /usr/bin/rm guuid=c3f5ebba-1900-0000-3dd1-52418e090000 pid=2446->guuid=d9e42dbb-1900-0000-3dd1-524191090000 pid=2449 execve guuid=be6c90bb-1900-0000-3dd1-524195090000 pid=2453 /usr/bin/rm delete-file guuid=46f018bb-1900-0000-3dd1-524190090000 pid=2448->guuid=be6c90bb-1900-0000-3dd1-524195090000 pid=2453 execve guuid=ba70a9bb-1900-0000-3dd1-524196090000 pid=2454 /usr/bin/rm guuid=94d17cbb-1900-0000-3dd1-524193090000 pid=2451->guuid=ba70a9bb-1900-0000-3dd1-524196090000 pid=2454 execve guuid=ba2703bc-1900-0000-3dd1-52419a090000 pid=2458 /usr/bin/rm guuid=0e39d9bb-1900-0000-3dd1-524198090000 pid=2456->guuid=ba2703bc-1900-0000-3dd1-52419a090000 pid=2458 execve guuid=887516bc-1900-0000-3dd1-52419b090000 pid=2459 /usr/bin/rm guuid=b6b0e7bb-1900-0000-3dd1-524199090000 pid=2457->guuid=887516bc-1900-0000-3dd1-52419b090000 pid=2459 execve guuid=b61b6fbc-1900-0000-3dd1-52419d090000 pid=2461 /usr/bin/rm guuid=cff840bc-1900-0000-3dd1-52419c090000 pid=2460->guuid=b61b6fbc-1900-0000-3dd1-52419d090000 pid=2461 execve guuid=5884cabc-1900-0000-3dd1-5241a1090000 pid=2465 /tmp/sample.bin net send-data zombie guuid=1da9c5bc-1900-0000-3dd1-5241a0090000 pid=2464->guuid=5884cabc-1900-0000-3dd1-5241a1090000 pid=2465 clone 856512cb-2529-595d-b709-43376a7f4d6f 213.232.114.169:180 guuid=5884cabc-1900-0000-3dd1-5241a1090000 pid=2465->856512cb-2529-595d-b709-43376a7f4d6f send: 13B guuid=ce5612f0-2000-0000-3dd1-524135100000 pid=4149 /tmp/sample.bin net send-data zombie guuid=6b9908f0-2000-0000-3dd1-524134100000 pid=4148->guuid=ce5612f0-2000-0000-3dd1-524135100000 pid=4149 clone guuid=ce5612f0-2000-0000-3dd1-524135100000 pid=4149->856512cb-2529-595d-b709-43376a7f4d6f send: 13B 77b342fc-65c9-5d9f-9dbd-f9ae84ef0505 232.114.169.180:180 guuid=ce5612f0-2000-0000-3dd1-524135100000 pid=4149->77b342fc-65c9-5d9f-9dbd-f9ae84ef0505 con 0719df9c-054b-541b-a283-391e930ff772 114.169.180.0:180 guuid=ce5612f0-2000-0000-3dd1-524135100000 pid=4149->0719df9c-054b-541b-a283-391e930ff772 con
Result
Threat name:
Gafgyt, Mirai
Detection:
malicious
Classification:
spre.troj.evad
Score:
100 / 100
Signature
Antivirus / Scanner detection for submitted sample
Contains symbols with names commonly found in malware
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Opens /proc/net/* files useful for finding connected devices and routers
Sample deletes itself
Suricata IDS alerts for network traffic
Yara detected Gafgyt
Yara detected Mirai
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1735960 Sample: i586.elf Startdate: 14/07/2025 Architecture: LINUX Score: 100 56 213.232.114.169, 180, 43288, 43294 ASN-QUADRANET-GLOBALUS Netherlands 2->56 58 169.254.169.254, 80 USDOSUS Reserved 2->58 60 3 other IPs or domains 2->60 62 Suricata IDS alerts for network traffic 2->62 64 Malicious sample detected (through community Yara rule) 2->64 66 Antivirus / Scanner detection for submitted sample 2->66 68 4 other signatures 2->68 9 i586.elf 2->9         started        12 python3.8 dpkg 2->12         started        signatures3 process4 signatures5 70 Opens /proc/net/* files useful for finding connected devices and routers 9->70 14 i586.elf 9->14         started        16 i586.elf sh 9->16         started        18 i586.elf sh 9->18         started        20 13 other processes 9->20 process6 process7 22 i586.elf sh 14->22         started        24 i586.elf sh 14->24         started        26 i586.elf sh 14->26         started        37 12 other processes 14->37 28 sh rm 16->28         started        31 sh rm 18->31         started        33 sh rm 20->33         started        35 sh rm 20->35         started        39 10 other processes 20->39 signatures8 41 sh rm 22->41         started        44 sh rm 24->44         started        46 sh rm 26->46         started        74 Sample deletes itself 28->74 48 sh rm 37->48         started        50 sh rm 37->50         started        52 sh rm 37->52         started        54 8 other processes 37->54 process9 signatures10 72 Sample deletes itself 41->72
Threat name:
Linux.Backdoor.Gafgyt
Status:
Malicious
First seen:
2025-07-14 11:29:19 UTC
File Type:
ELF32 Little (Exe)
AV detection:
17 of 24 (70.83%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:gafgyt linux rootkit
Behaviour
Loads a kernel module
Verdict:
Malicious
Tags:
botnet trojan gafgyt mirai Unix.Trojan.Gafgyt-6981154-0
YARA:
botnet_dedsec botnet_dayzddos Linux_Trojan_Gafgyt_28a2fe0c Linux_Trojan_Gafgyt_c573932b Linux_Trojan_Gafgyt_5bf62ce4 Linux_Trojan_Gafgyt_6122acdf Linux_Trojan_Gafgyt_7167d08f Linux_Trojan_Mirai_389ee3e9 Linux_Gafgyt_May_2024
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:botnet_dayzddos
Author:NDA0E
Description:dayzddos botnet
Rule name:botnet_dedsec
Author:NDA0E
Description:dedsec botnet
Rule name:botnet_plaintext_c2
Author:cip
Description:Attempts to match at least some of the strings used in some botnet variants which use plaintext communication protocols.
Rule name:Linux_Gafgyt_Generic
Author:albertzsigovits
Description:Generic Approach to Mirai/Gafgyt samples
Rule name:Linux_Trojan_Gafgyt_28a2fe0c
Author:Elastic Security
Rule name:Linux_Trojan_Gafgyt_5bf62ce4
Author:Elastic Security
Rule name:Linux_Trojan_Gafgyt_6122acdf
Author:Elastic Security
Rule name:Linux_Trojan_Gafgyt_7167d08f
Author:Elastic Security
Rule name:Linux_Trojan_Gafgyt_c573932b
Author:Elastic Security
Rule name:Linux_Trojan_Mirai_389ee3e9
Author:Elastic Security
Rule name:maldoc_getEIP_method_1
Author:Didier Stevens (https://DidierStevens.com)
Rule name:meth_get_eip
Author:Willi Ballenthin
Rule name:Mirai_Unpack
Rule name:NET
Author:malware-lu
Rule name:Qbot_Gafgyt_Bashlite
Rule name:ScanStringsInsocks5systemz
Author:Byambaa@pubcert.mn
Description:Scans presence of the found strings using the in-house brute force method
Rule name:setsockopt
Author:Tim Brown @timb_machine
Description:Hunts for setsockopt() red flags
Rule name:unixredflags3
Author:Tim Brown @timb_machine
Description:Hunts for UNIX red flags

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

elf 8ab5de147cccce1eccea9bd3503b08710b02605951c0c75554b53e492976038a

(this sample)

  
Delivery method
Distributed via web download

Comments