MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 8d995c07719f9ee40a30dc026cc985aa920e782bd0b3ee0904539a8c88485bbb. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 10


Intelligence 10 IOCs YARA File information Comments

SHA256 hash: 8d995c07719f9ee40a30dc026cc985aa920e782bd0b3ee0904539a8c88485bbb
SHA3-384 hash: 4213f3680d85e42c4a6c113dada24eea64c2c28676cd8f0d7d3373c3a73a4d97e1355b060fc482338527d41a71083222
SHA1 hash: 69b8c0b6bd63da41100b089342fc0bf6d88ad752
MD5 hash: 25710eb87b9ee7ff4dc77456096eda22
humanhash: tennessee-jupiter-football-idaho
File name:boatnet.arm6
Download: download sample
Signature Mirai
File size:27'300 bytes
First seen:2024-05-06 23:19:06 UTC
Last seen:2024-05-06 23:20:06 UTC
File type: elf
MIME type:application/x-executable
ssdeep 768:eMKyhegCCMqfizjoNpd2vJdX6vwrIu9q3UELul:NKy4qfqoeJdXWgITLs
TLSH T154C2D1E07726FE31C520AC3DD52A4D8A3A51067C91FF393664158D358FC165B63E48FA
TrID 50.1% (.) ELF Executable and Linkable format (Linux) (4022/12)
49.8% (.O) ELF Executable and Linkable format (generic) (4000/1)
Reporter elfdigest
Tags:mirai

Intelligence


File Origin
# of uploads :
3
# of downloads :
104
Origin country :
DE DE
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
android anti-debug masquerade mirai packed upx
Verdict:
Malicious
Uses P2P?:
false
Uses anti-vm?:
false
Architecture:
arm
Packer:
UPX
Botnet:
174.138.28.28/hiddenbin
Number of open files:
0
Number of processes launched:
0
Processes remaning?
false
Remote TCP ports scanned:
not identified
Behaviour
no suspicious findings
Botnet C2s
TCP botnet C2(s):
not identified
UDP botnet C2(s):
not identified
Result
Threat name:
Detection:
malicious
Classification:
troj.evad
Score:
68 / 100
Signature
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Sample is packed with UPX
Yara detected Mirai
Behaviour
Behavior Graph:
Threat name:
Linux.Trojan.Mirai
Status:
Malicious
First seen:
2024-05-06 01:46:43 UTC
File Type:
ELF32 Little (Exe)
AV detection:
21 of 38 (55.26%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
upx
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

elf 8d995c07719f9ee40a30dc026cc985aa920e782bd0b3ee0904539a8c88485bbb

(this sample)

  
Delivery method
Distributed via web download

Comments