MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 8d289d832d7cc9a250a18ef79ac1994ffc7cfa7bba80a12ce19584fbd2e23c53. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 8


Intelligence 8 IOCs YARA File information Comments

SHA256 hash: 8d289d832d7cc9a250a18ef79ac1994ffc7cfa7bba80a12ce19584fbd2e23c53
SHA3-384 hash: dd32e97555ebe55c60602f5a95c668c7cced4e0537603fb6d51a9e2c14a8393f95f37fb6ccbea995fc2670ed37b14fae
SHA1 hash: fa60d3565093394cae9d49540396a23a23a49b86
MD5 hash: aeaa5d414ce149d8c9e7762ca545f68c
humanhash: maine-angel-queen-glucose
File name:arm-20220414-1450
Download: download sample
Signature Mirai
File size:20'608 bytes
First seen:2022-04-14 14:50:06 UTC
Last seen:Never
File type: elf
MIME type:application/x-executable
ssdeep 384:jC43YzCnT4c4qan+mrPj3c5Y4MgFpkftckJ3KWhymdGUop5hR:iI4c4Jnr73CYHWc3KWs3Uozn
TLSH T19292D0303A8AA5A4C7744C3988955AC1650F09ECC1F3323339BC9F68A5D6D26B6F86C7
TrID 50.1% (.) ELF Executable and Linkable format (Linux) (4022/12)
49.8% (.O) ELF Executable and Linkable format (generic) (4000/1)
Reporter tolisec
Tags:mirai

Intelligence


File Origin
# of uploads :
1
# of downloads :
189
Origin country :
n/a
Vendor Threat Intelligence
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
anti-debug
Verdict:
Malicious
Uses P2P?:
false
Uses anti-vm?:
false
Architecture:
arm
Packer:
UPX
Botnet:
172.245.36.116:80/bins
Number of open files:
0
Number of processes launched:
4
Processes remaning?
true
Remote TCP ports scanned:
23
Behaviour
Process Renaming
Botnet C2s
TCP botnet C2(s):
172.245.36.116:9372
UDP botnet C2(s):
not identified
Result
Verdict:
MALICIOUS
Result
Threat name:
Detection:
malicious
Classification:
troj.evad
Score:
60 / 100
Signature
Multi AV Scanner detection for submitted file
Sample is packed with UPX
Yara detected Mirai
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 609468 Sample: arm-20220414-1450 Startdate: 14/04/2022 Architecture: LINUX Score: 60 19 94.160.109.0, 23 WINDTRE-ASIT Italy 2->19 21 161.177.14.97 WAL-MARTUS United States 2->21 23 98 other IPs or domains 2->23 25 Multi AV Scanner detection for submitted file 2->25 27 Yara detected Mirai 2->27 29 Sample is packed with UPX 2->29 9 arm-20220414-1450 2->9         started        signatures3 process4 process5 11 arm-20220414-1450 9->11         started        13 arm-20220414-1450 9->13         started        process6 15 arm-20220414-1450 11->15         started        process7 17 arm-20220414-1450 15->17         started       
Threat name:
Linux.Trojan.Mirai
Status:
Malicious
First seen:
2022-04-02 12:14:16 UTC
File Type:
ELF32 Little (Exe)
AV detection:
20 of 42 (47.62%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  1/10
Tags:
linux
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

elf 8d289d832d7cc9a250a18ef79ac1994ffc7cfa7bba80a12ce19584fbd2e23c53

(this sample)

  
Delivery method
Distributed via web download

Comments