MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 93e2ebbccb009525a49b0ed1586d665270327961c35c53c6b41b89b326df7cad. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 8


Intelligence 8 IOCs YARA File information Comments

SHA256 hash: 93e2ebbccb009525a49b0ed1586d665270327961c35c53c6b41b89b326df7cad
SHA3-384 hash: 19293cad04e0f2f0727299bbd52e24c13f15b2a0909f697c1890164d3d6594c399f4167045cd068ffe66673efb4b4367
SHA1 hash: 161d7e3260df2a87f29fd517c2fd4b9f69c4bac4
MD5 hash: e356ca824086cec5f6a36902659fe420
humanhash: high-triple-friend-rugby
File name:sora.x86
Download: download sample
Signature Mirai
File size:24'728 bytes
First seen:2022-04-21 18:50:03 UTC
Last seen:Never
File type: elf
MIME type:application/x-executable
ssdeep 384:MVDKKQOcRpmYLdn6RBOFRFt5rUFW10iSelCo3AnupPFNqnrrd1NEZgO8UXWozPL6:w/QOC0Yhn6ROHWFGrcwNVFCnNBxcfcJ
TLSH T1A0B2F199D6FB1BC3C2A1D336D07C4A4EE1721AC00747450A1109B28FA79764E4BFB3B5
TrID 50.1% (.) ELF Executable and Linkable format (Linux) (4022/12)
49.8% (.O) ELF Executable and Linkable format (generic) (4000/1)
Reporter tolisec
Tags:mirai

Intelligence


File Origin
# of uploads :
1
# of downloads :
283
Origin country :
n/a
Vendor Threat Intelligence
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
anti-debug
Verdict:
Malicious
Uses P2P?:
false
Uses anti-vm?:
false
Architecture:
x86
Packer:
UPX
Botnet:
185.44.81.86:80/bins
Number of open files:
4
Number of processes launched:
7
Processes remaning?
true
Remote TCP ports scanned:
23
Behaviour
Process Renaming
Botnet C2s
TCP botnet C2(s):
185.44.81.86:1312
UDP botnet C2(s):
not identified
Result
Verdict:
MALICIOUS
Result
Threat name:
Detection:
malicious
Classification:
troj.evad
Score:
64 / 100
Signature
Multi AV Scanner detection for submitted file
Sample is packed with UPX
Uses known network protocols on non-standard ports
Yara detected Mirai
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 613438 Sample: sora.x86 Startdate: 21/04/2022 Architecture: LINUX Score: 64 42 13.26.67.148, 23 XEROX-WVUS United States 2->42 44 58.178.161.52 VOCUS-RETAIL-AUVocusRetailAU Australia 2->44 46 98 other IPs or domains 2->46 48 Multi AV Scanner detection for submitted file 2->48 50 Yara detected Mirai 2->50 52 Uses known network protocols on non-standard ports 2->52 54 Sample is packed with UPX 2->54 10 sora.x86 2->10         started        signatures3 process4 process5 12 sora.x86 10->12         started        14 sora.x86 10->14         started        16 sora.x86 10->16         started        process6 18 sora.x86 12->18         started        20 sora.x86 12->20         started        22 sora.x86 14->22         started        24 sora.x86 14->24         started        26 sora.x86 14->26         started        process7 28 sora.x86 18->28         started        30 sora.x86 18->30         started        32 sora.x86 18->32         started        34 sora.x86 22->34         started        36 sora.x86 22->36         started        process8 38 sora.x86 28->38         started        40 sora.x86 28->40         started       
Threat name:
Linux.Trojan.Mirai
Status:
Malicious
First seen:
2022-04-21 18:51:06 UTC
File Type:
ELF32 Little (Exe)
AV detection:
18 of 25 (72.00%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  9/10
Tags:
discovery linux
Behaviour
Contacts a large (175478) amount of remote hosts
Creates a large amount of network flows
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

elf 93e2ebbccb009525a49b0ed1586d665270327961c35c53c6b41b89b326df7cad

(this sample)

  
Delivery method
Distributed via web download

Comments