MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 9878b4183be068b638e04656a02c5679f02a5a982e472cc1c497cc654345f3b6. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: 9878b4183be068b638e04656a02c5679f02a5a982e472cc1c497cc654345f3b6
SHA3-384 hash: bd707512d0af5093d3358d4949384ad7c796519dc7f13803461cbdddd4cb134aa05d4d2ffe9be54d0ba72a111a520b7a
SHA1 hash: d3f6a97ebb98c10a637dec14610288c969734bf4
MD5 hash: 5fa6bb58f501e5f34d2b653cb941b2fb
humanhash: floor-johnny-nineteen-river
File name:skid.armv5l
Download: download sample
Signature Mirai
File size:108'508 bytes
First seen:2025-04-21 10:38:18 UTC
Last seen:Never
File type: elf
MIME type:application/x-executable
ssdeep 1536:uSnwXj+4Re4kzj/ceItPFmdAgUTfE9DO3IM2NQwL7qQ+vLIqLqGgzex/T3TEOCZ:yj+ZHKtPsWgUTMk32NQQwLqGzfCZ
TLSH T144B30B4DE861AB2581E529BAFE5E44CD330217BCD2EB71158C065F60778F98D0E3EAC6
Magika elf
Reporter abuse_ch
Tags:elf mirai

Intelligence


File Origin
# of uploads :
1
# of downloads :
124
Origin country :
DE DE
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Connection attempt
DNS request
Runs as daemon
Creating a file
Opens a port
Receives data from a server
Sends data to a server
Substitutes an application name
Result
Threat name:
n/a
Detection:
malicious
Classification:
troj.evad
Score:
56 / 100
Signature
Performs DNS TXT record lookups
Suricata IDS alerts for network traffic
Uses STUN server to do NAT traversial
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1670254 Sample: skid.armv5l.elf Startdate: 21/04/2025 Architecture: LINUX Score: 56 18 stun.l.google.com 2->18 20 6mv1eyr328y6due83u3js6whtzuxfyhw.su 2->20 22 5 other IPs or domains 2->22 24 Suricata IDS alerts for network traffic 2->24 8 skid.armv5l.elf 2->8         started        10 dash rm 2->10         started        12 dash rm 2->12         started        signatures3 26 Uses STUN server to do NAT traversial 18->26 28 Performs DNS TXT record lookups 20->28 process4 process5 14 skid.armv5l.elf 8->14         started        process6 16 skid.armv5l.elf 14->16         started       
Threat name:
Linux.Worm.Mirai
Status:
Malicious
First seen:
2025-04-21 10:39:08 UTC
File Type:
ELF32 Little (Exe)
AV detection:
14 of 38 (36.84%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
credential_access discovery
Behaviour
Reads runtime system information
Changes its process name
Reads process memory
Enumerates running processes
Renames itself
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

elf 9878b4183be068b638e04656a02c5679f02a5a982e472cc1c497cc654345f3b6

(this sample)

  
Delivery method
Distributed via web download

Comments