MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 9c04e1dbeeff0e9a13b1f0d76a8552a4363ab67435badb7175c880008431cc35. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 9


Intelligence 9 IOCs YARA File information Comments 1

SHA256 hash: 9c04e1dbeeff0e9a13b1f0d76a8552a4363ab67435badb7175c880008431cc35
SHA3-384 hash: a106efdca9531d5aa0be86b1c759375080c5112ac424044dbfba5b4fcb91e3adc3fe670bcd8c2321bfa5e4dd6970bd40
SHA1 hash: ea24a8aa06cf997dc672a9aaee0ffaa47994eb83
MD5 hash: 9edf7483e9c8a98e4b9598b887486472
humanhash: coffee-nineteen-venus-kilo
File name:9edf7483e9c8a98e4b9598b887486472
Download: download sample
Signature Mirai
File size:18'488 bytes
First seen:2023-05-18 09:24:30 UTC
Last seen:2023-05-18 14:00:24 UTC
File type: elf
MIME type:application/x-executable
ssdeep 384:MjlzRV0P6iOwrkom0DRnVATuSlShu6NvmPWtUn+KMaLhymdGUop5h5lK:6/V0P6+kom0tVAoNvm+to1Ls3UoznlK
TLSH T1B482DF3061AB75E9DBE10435EAAECEC6971A0BF8D1FC369317586B7CC94210621F92C6
TrID 50.1% (.) ELF Executable and Linkable format (Linux) (4022/12)
49.8% (.O) ELF Executable and Linkable format (generic) (4000/1)
Reporter zbetcheckin
Tags:32 arm elf mirai

Intelligence


File Origin
# of uploads :
2
# of downloads :
114
Origin country :
FR FR
Vendor Threat Intelligence
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
anti-debug mirai
Verdict:
Malicious
Uses P2P?:
false
Uses anti-vm?:
false
Architecture:
arm
Packer:
UPX
Botnet:
unknown
Number of open files:
0
Number of processes launched:
0
Processes remaning?
false
Remote TCP ports scanned:
not identified
Behaviour
no suspicious findings
Botnet C2s
TCP botnet C2(s):
not identified
UDP botnet C2(s):
not identified
Result
Verdict:
UNKNOWN
Result
Threat name:
Detection:
malicious
Classification:
troj.evad
Score:
68 / 100
Signature
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Sample is packed with UPX
Yara detected Mirai
Behaviour
Behavior Graph:
Threat name:
Linux.Trojan.Mirai
Status:
Malicious
First seen:
2023-05-18 09:25:08 UTC
File Type:
ELF32 Little (Exe)
AV detection:
19 of 24 (79.17%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
upx
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

elf 9c04e1dbeeff0e9a13b1f0d76a8552a4363ab67435badb7175c880008431cc35

(this sample)

  
Delivery method
Distributed via web download

Comments



Avatar
zbet commented on 2023-05-18 09:24:33 UTC

url : hxxp://141.98.6.137/hiddenbin/boatnet.arm5