MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 a3bc6a5b3b1b91c003d860111ffcb4fa55bfa317085bf5957de445365918cd8a. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 10


Intelligence 10 IOCs YARA File information Comments

SHA256 hash: a3bc6a5b3b1b91c003d860111ffcb4fa55bfa317085bf5957de445365918cd8a
SHA3-384 hash: 950b92a2084ea35896238c4f3c4ba296377b443115722773ff420b30c2854d3b10d8260bc688ef62180021606e6068ed
SHA1 hash: 2746890faa8f8e3077634cbce2ed4e04b2edde90
MD5 hash: fee0e3a4d0cf71f0ddb9e5e2c6357886
humanhash: hotel-april-july-vermont
File name:Owari.sh4
Download: download sample
Signature Mirai
File size:51'072 bytes
First seen:2026-02-07 14:28:06 UTC
Last seen:Never
File type: elf
MIME type:application/x-executable
ssdeep 768:waIwqwtOZc5p3hnYep3v0Gvdn/fAPs3g58cAlOSpE4rC/oIaNCy:wanqwtYduxxAPs3gvAlZpEyvLNCy
TLSH T19F338DA5C4B9ADE8D2148E74BD258E788763E100C6932EFAEE4486599047EFCF1583F4
TrID 50.1% (.) ELF Executable and Linkable format (Linux) (4022/12)
49.8% (.O) ELF Executable and Linkable format (generic) (4000/1)
Magika elf
Reporter abuse_ch
Tags:elf mirai

Intelligence


File Origin
# of uploads :
1
# of downloads :
43
Origin country :
DE DE
Vendor Threat Intelligence
Malware configuration found for:
Mirai
Details
Mirai
a c2 socket address and a scan socket address
Verdict:
Malicious
File Type:
elf.32.le
First seen:
2026-02-07T11:34:00Z UTC
Last seen:
2026-02-08T01:46:00Z UTC
Hits:
~10
Detections:
HEUR:Backdoor.Linux.Mirai.ba HEUR:Backdoor.Linux.Mirai.b
Result
Threat name:
n/a
Detection:
malicious
Classification:
n/a
Score:
56 / 100
Signature
Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1865266 Sample: Owari.sh4.elf Startdate: 07/02/2026 Architecture: LINUX Score: 56 50 82.70.92.10 ZEN-ASZenInternet-UKGB United Kingdom 2->50 52 13.12.31.129 XEROX-WVUS United States 2->52 54 99 other IPs or domains 2->54 56 Antivirus / Scanner detection for submitted sample 2->56 58 Multi AV Scanner detection for submitted file 2->58 10 Owari.sh4.elf 2->10         started        12 systemd snap-failure 2->12         started        14 python3.8 dpkg 2->14         started        signatures3 process4 process5 16 Owari.sh4.elf 10->16         started        18 Owari.sh4.elf 10->18         started        20 Owari.sh4.elf 10->20         started        22 snap-failure systemctl 12->22         started        24 snap-failure 12->24         started        process6 26 Owari.sh4.elf 16->26         started        28 Owari.sh4.elf 16->28         started        30 Owari.sh4.elf 18->30         started        32 Owari.sh4.elf 18->32         started        34 Owari.sh4.elf 18->34         started        process7 36 Owari.sh4.elf 26->36         started        38 Owari.sh4.elf 26->38         started        40 Owari.sh4.elf 26->40         started        42 Owari.sh4.elf 30->42         started        44 Owari.sh4.elf 30->44         started        process8 46 Owari.sh4.elf 36->46         started        48 Owari.sh4.elf 36->48         started       
Threat name:
Linux.Worm.Mirai
Status:
Malicious
First seen:
2026-02-07 14:22:47 UTC
File Type:
ELF32 Little (Exe)
AV detection:
18 of 24 (75.00%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:mirai linux
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

elf a3bc6a5b3b1b91c003d860111ffcb4fa55bfa317085bf5957de445365918cd8a

(this sample)

  
Delivery method
Distributed via web download

Comments