MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 974915fc572faa8afe86527a4412175cc250bb6b4c96e925ba1a83e473c09d46. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments 1

SHA256 hash: 974915fc572faa8afe86527a4412175cc250bb6b4c96e925ba1a83e473c09d46
SHA3-384 hash: 921993c54ef6bd69e501807a657857ad0f333afff69033ab287e254412e61115da70dcf99ab25376d3402d46064d956d
SHA1 hash: 06da18d855ef0139f6275fee4564051f3c20d576
MD5 hash: 6834e61d65a63dab87c66996f54b1625
humanhash: kansas-fourteen-glucose-pip
File name:6834e61d65a63dab87c66996f54b1625
Download: download sample
Signature Mirai
File size:69'080 bytes
First seen:2021-07-22 14:48:05 UTC
Last seen:Never
File type: elf
MIME type:application/x-executable
ssdeep 1536:AHNFnXDuPq/SyZBp9tsCI0v6bqfg/Kkz73o2x8sW:gNFXDKGrJI0SWYz73o2OX
TLSH T1BE63961A3E219FBEFBAC863847B74A219658339622F1C5C4E15CEE015E7034E745FB98
telfhash t175016d58443817f093814c9d6becff76e09140df59625e3b8d00e99ada26a468d00d2c
Reporter zbetcheckin
Tags:32 elf mips mirai

Intelligence


File Origin
# of uploads :
1
# of downloads :
124
Origin country :
n/a
Vendor Threat Intelligence
Verdict:
Malicious
Uses P2P?:
false
Uses anti-vm?:
false
Architecture:
mips
Packer:
not packed
Botnet:
unknown
Number of open files:
67
Number of processes launched:
16
Processes remaning?
true
Remote TCP ports scanned:
23
Behaviour
Process Renaming
Botnet C2s
TCP botnet C2(s):
195.133.40.108:666
UDP botnet C2(s):
not identified
Result
Verdict:
MALICIOUS
Result
Threat name:
Detection:
malicious
Classification:
spre.troj.spyw
Score:
72 / 100
Signature
Multi AV Scanner detection for submitted file
Opens /sys/class/net/* files useful for querying network interface information
Sample tries to kill many processes (SIGKILL)
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Yara detected Mirai
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 452640 Sample: NHnpjXX0sb Startdate: 22/07/2021 Architecture: LINUX Score: 72 33 216.0.28.236 XO-AS15US United States 2->33 35 107.182.49.200 VOLCANO-VISIONUS United States 2->35 37 98 other IPs or domains 2->37 39 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->39 41 Multi AV Scanner detection for submitted file 2->41 43 Yara detected Mirai 2->43 8 NHnpjXX0sb 2->8         started        10 systemd NetworkManager 2->10         started        13 systemd nm-dispatcher 2->13         started        15 9 other processes 2->15 signatures3 process4 signatures5 17 NHnpjXX0sb 8->17         started        19 NHnpjXX0sb 8->19         started        22 NHnpjXX0sb 8->22         started        47 Opens /sys/class/net/* files useful for querying network interface information 10->47 24 nm-dispatcher 01ifupdown 13->24         started        process6 signatures7 26 NHnpjXX0sb 17->26         started        29 NHnpjXX0sb 17->29         started        31 NHnpjXX0sb 17->31         started        45 Sample tries to kill many processes (SIGKILL) 19->45 process8 signatures9 49 Sample tries to kill many processes (SIGKILL) 26->49
Threat name:
Linux.Trojan.Mirai
Status:
Malicious
First seen:
2021-07-22 14:49:04 UTC
AV detection:
25 of 45 (55.56%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  1/10
Tags:
linux
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

elf 974915fc572faa8afe86527a4412175cc250bb6b4c96e925ba1a83e473c09d46

(this sample)

  
Delivery method
Distributed via web download

Comments



Avatar
zbet commented on 2021-07-22 14:48:06 UTC

url : hxxp://195.133.40.108/AB4g5/Josho.mips