MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 8bd9cd2985e68a3b29f277470c5e6c66a3a915e125139367a9058ea51fc9add9. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 8


Intelligence 8 IOCs YARA 6 File information Comments

SHA256 hash: 8bd9cd2985e68a3b29f277470c5e6c66a3a915e125139367a9058ea51fc9add9
SHA3-384 hash: 87b1bcae3a80d2512f3191d4ff1a15de7b5cb693be8aae051edea76a475a1a7a606c7f92c8ecb8c1611e62ce65ac1873
SHA1 hash: 66ec12868cbc65fe966a6c1c47c07920cfded4d6
MD5 hash: 317eec4c95876e44de1a0dd521e4f75b
humanhash: indigo-princess-eighteen-charlie
File name:sparc
Download: download sample
Signature Mirai
File size:1'036'072 bytes
First seen:2025-05-20 17:32:47 UTC
Last seen:Never
File type: elf
MIME type:application/x-executable
ssdeep 12288:MYTHgd6wDCneDAmR7QQTIIKV6c7PrHyXNJFVOhBCEdz3PY9uj2sXX2Nl:PTtzmRcQcLENEJKsXX2N
TLSH T1F8259D427BF48925C5548332CDF683207363E3A966D1071FCB989EADDF422486F95CEA
telfhash t193f0aca04a7d80800d62ec005c5211ff5eebd6a61e82f945fb46ddc52c6e41dfb43d4b
Magika elf
Reporter abuse_ch
Tags:elf mirai

Intelligence


File Origin
# of uploads :
1
# of downloads :
109
Origin country :
DE DE
Vendor Threat Intelligence
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
bash gcc lolbin remote
Result
Threat name:
n/a
Detection:
malicious
Classification:
troj.evad
Score:
68 / 100
Signature
Drops files in suspicious directories
Drops invisible ELF files
Malicious sample detected (through community Yara rule)
Sample tries to persist itself using .desktop files
Writes ELF files to hidden directories
Writes identical ELF files to multiple locations
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1695293 Sample: sparc.elf Startdate: 20/05/2025 Architecture: LINUX Score: 68 151 daisy.ubuntu.com 2->151 161 Malicious sample detected (through community Yara rule) 2->161 15 sparc.elf 2->15         started        signatures3 process4 file5 143 /tmp/systemd-priva...ig/.update-47763861, ELF 15->143 dropped 145 /tmp/systemd-priva...he/.update-615d2515, ELF 15->145 dropped 147 /root/snap/.config/.update-1fda7819, ELF 15->147 dropped 149 5 other malicious files 15->149 dropped 153 Writes ELF files to hidden directories 15->153 155 Writes identical ELF files to multiple locations 15->155 157 Sample tries to persist itself using .desktop files 15->157 159 Drops invisible ELF files 15->159 19 sparc.elf 15->19         started        signatures6 process7 process8 21 sparc.elf 19->21         started        file9 81 /usr/local/sbin/update, ELF 21->81 dropped 83 /usr/local/sbin/lists, ELF 21->83 dropped 165 Writes identical ELF files to multiple locations 21->165 25 sparc.elf update 21->25         started        29 sparc.elf lists 21->29         started        signatures10 process11 file12 93 /tmp/systemd-priva...rt/.update-6851fa92, ELF 25->93 dropped 95 /root/snap/.config...rt/.update-51ea4abf, ELF 25->95 dropped 97 /root/snap/.config/.update-7f711499, ELF 25->97 dropped 105 5 other malicious files 25->105 dropped 175 Writes ELF files to hidden directories 25->175 177 Writes identical ELF files to multiple locations 25->177 179 Sample tries to persist itself using .desktop files 25->179 31 update 25->31         started        99 /tmp/systemd-priva...rt/.update-7ac6cfa8, ELF 29->99 dropped 101 /root/snap/.config...rt/.update-15e66533, ELF 29->101 dropped 103 /root/snap/.config/.update-1e2b3686, ELF 29->103 dropped 107 5 other malicious files 29->107 dropped 181 Drops invisible ELF files 29->181 33 lists 29->33         started        signatures13 process14 process15 35 update 31->35         started        39 lists 33->39         started        file16 73 /usr/local/sbin/servers, ELF 35->73 dropped 75 /usr/local/bin/update, ELF 35->75 dropped 163 Writes identical ELF files to multiple locations 35->163 41 update servers 35->41         started        45 update update 35->45         started        77 /usr/local/sbin/updater, ELF 39->77 dropped 79 /usr/local/bin/lists, ELF 39->79 dropped 47 lists lists 39->47         started        49 lists updater 39->49         started        signatures17 process18 file19 109 /tmp/systemd-priva...rt/.update-6768c2e4, ELF 41->109 dropped 119 7 other malicious files 41->119 dropped 183 Writes ELF files to hidden directories 41->183 185 Writes identical ELF files to multiple locations 41->185 187 Sample tries to persist itself using .desktop files 41->187 51 servers 41->51         started        111 /tmp/systemd-priva...rt/.update-5e485c78, ELF 45->111 dropped 121 7 other malicious files 45->121 dropped 189 Drops invisible ELF files 45->189 53 update 45->53         started        113 /tmp/systemd-priva...rt/.update-457bc629, ELF 47->113 dropped 115 /root/snap/.config...art/.update-d6e4508, ELF 47->115 dropped 123 6 other malicious files 47->123 dropped 55 lists 47->55         started        117 /tmp/systemd-priva...rt/.update-545493b2, ELF 49->117 dropped 125 7 other malicious files 49->125 dropped 57 updater 49->57         started        signatures20 process21 process22 59 servers 51->59         started        63 update 53->63         started        65 lists 55->65         started        67 updater 57->67         started        file23 127 /usr/sbin/update, ELF 59->127 dropped 129 /usr/local/bin/servers, ELF 59->129 dropped 191 Writes identical ELF files to multiple locations 59->191 193 Drops files in suspicious directories 59->193 69 servers servers 59->69         started        131 /usr/sbin/lists, ELF 63->131 dropped 133 /usr/local/bin/updater, ELF 63->133 dropped 135 /usr/sbin/servers, ELF 65->135 dropped 137 /usr/bin/update, ELF 65->137 dropped 139 /usr/sbin/updater, ELF 67->139 dropped 141 /usr/bin/lists, ELF 67->141 dropped signatures24 process25 file26 85 /tmp/systemd-priva...rt/.update-104f1137, ELF 69->85 dropped 87 /root/snap/.config...rt/.update-66ac2bf9, ELF 69->87 dropped 89 /root/snap/.config/.update-1569c5ef, ELF 69->89 dropped 91 5 other malicious files 69->91 dropped 167 Writes ELF files to hidden directories 69->167 169 Writes identical ELF files to multiple locations 69->169 171 Sample tries to persist itself using .desktop files 69->171 173 Drops invisible ELF files 69->173 signatures27
Threat name:
Linux.Trojan.SAgnt
Status:
Malicious
First seen:
2025-05-20 17:24:21 UTC
File Type:
ELF64 Big (Exe)
AV detection:
16 of 37 (43.24%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  1/10
Tags:
linux
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:F01_s1ckrule
Author:s1ckb017
Rule name:ldpreload
Author:xorseed
Reference:https://stuff.rop.io/
Rule name:linux_generic_ipv6_catcher
Author:@_lubiedo
Description:ELF samples using IPv6 addresses
Rule name:malwareelf55503
Rule name:setsockopt
Author:Tim Brown @timb_machine
Description:Hunts for setsockopt() red flags
Rule name:unixredflags3
Author:Tim Brown @timb_machine
Description:Hunts for UNIX red flags

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

elf 8bd9cd2985e68a3b29f277470c5e6c66a3a915e125139367a9058ea51fc9add9

(this sample)

  
Delivery method
Distributed via web download

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_PIEMissing Position-Independent Executable (PIE) Protectionhigh

Comments