MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 a261c118c3555f36f1c9e2a83acb7e378d3b860d12f7584aafbd91e34b7ee59e. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 9


Intelligence 9 IOCs YARA 5 File information Comments

SHA256 hash: a261c118c3555f36f1c9e2a83acb7e378d3b860d12f7584aafbd91e34b7ee59e
SHA3-384 hash: 7b7dd2d60e732d7480aafde14037bbcb74916c68643470fc8042f5d958526276ca977d017dbfcf7055e60336c907a04d
SHA1 hash: 70c97f8599642a37c17817a9c9ae74dc15474b7e
MD5 hash: 0fc3a2be43bd8672e8f47aa7e459ca04
humanhash: uncle-skylark-skylark-cup
File name:arm6
Download: download sample
Signature Mirai
File size:103'916 bytes
First seen:2026-03-04 14:15:42 UTC
Last seen:Never
File type: elf
MIME type:application/x-executable
ssdeep 3072:u19sWSVH+jbpzgoNuaPnNa24jKCjBvoVVM:k9sWSVH8b1gogaIrWCjuVK
TLSH T160A32A56FD824B22C5D512BAFA1E118D331313BCE2DE72129E206F2477CA95F0E7B946
telfhash t148f0ac7a5eb92fcd23800304d1dd3315c62937f9762a1c44d15f5a0adb939d2307e88e
TrID 50.1% (.) ELF Executable and Linkable format (Linux) (4022/12)
49.8% (.O) ELF Executable and Linkable format (generic) (4000/1)
Magika elf
Reporter abuse_ch
Tags:elf mirai upx-dec


Avatar
abuse_ch
UPX decompressed file, sourced from SHA256 9b74c3e233c6a8f3b5e76e2b537987814de5378f3b31cf9fefb1ce473d731c27
File size (compressed) :46'832 bytes
File size (de-compressed) :103'916 bytes
Format:linux/arm
Packed file: 9b74c3e233c6a8f3b5e76e2b537987814de5378f3b31cf9fefb1ce473d731c27

Intelligence


File Origin
# of uploads :
1
# of downloads :
68
Origin country :
NL NL
Vendor Threat Intelligence
Result
Gathering data
Verdict:
Malicious
File Type:
ELF 32 LE
Detections:
HEUR:Backdoor.Linux.Mirai.h HEUR:Backdoor.Linux.Mirai.cw HEUR:Backdoor.Linux.Mirai.b
Status:
terminated
Behavior Graph:
%3 guuid=ed42d277-1900-0000-aa9f-0ec6ea070000 pid=2026 /usr/bin/sudo guuid=769afb79-1900-0000-aa9f-0ec6ee070000 pid=2030 /tmp/sample.bin guuid=ed42d277-1900-0000-aa9f-0ec6ea070000 pid=2026->guuid=769afb79-1900-0000-aa9f-0ec6ee070000 pid=2030 execve
Threat name:
Linux.Worm.Mirai
Status:
Malicious
First seen:
2026-03-04 14:16:26 UTC
File Type:
ELF32 Little (Exe)
AV detection:
20 of 36 (55.56%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:mirai
Malware Config
C2 Extraction:
okokokokokdsahvf.govnet.vip
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:ELF_Toriilike_persist
Author:4r4
Description:Detects Torii IoT Botnet (stealthier Mirai alternative)
Reference:Identified via researched data
Rule name:linux_generic_ipv6_catcher
Author:@_lubiedo
Description:ELF samples using IPv6 addresses
Rule name:Linux_Trojan_Gafgyt_28a2fe0c
Author:Elastic Security
Rule name:telebot_framework
Author:vietdx.mb
Rule name:unixredflags3
Author:Tim Brown @timb_machine
Description:Hunts for UNIX red flags

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

elf a261c118c3555f36f1c9e2a83acb7e378d3b860d12f7584aafbd91e34b7ee59e

(this sample)

  
Delivery method
Distributed via web download

Comments