MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 a93d680be343103edd02547e64ecb255a9bdaf532056ea59eef656e161ea2f27. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 11


Intelligence 11 IOCs YARA 4 File information Comments

SHA256 hash: a93d680be343103edd02547e64ecb255a9bdaf532056ea59eef656e161ea2f27
SHA3-384 hash: 49ab2f8acc54f5f484841fad53c9c3401b89c89c37d432bff9aa7fcb6a9be78096149841183a49693a53788c6c5a2f71
SHA1 hash: 9421cbc4de8fb70611e3cc3cfbdb64f099b821a3
MD5 hash: d500bb88e94c7adf7915338958d07621
humanhash: lima-nevada-crazy-connecticut
File name:Fantazy.m68k
Download: download sample
Signature Mirai
File size:60'120 bytes
First seen:2026-01-06 13:13:51 UTC
Last seen:Never
File type: elf
MIME type:application/x-executable
ssdeep 1536:uh0WUw7nsZ/K2YwtfM/3qXQJreBeXyy8rvq:uDUviXWM/agmeCfvq
TLSH T179432A95B801EFBDF84ED6F582160A0DF831626154530F23B767FE932D710E2E92AD46
Magika elf
Reporter abuse_ch
Tags:elf mirai

Intelligence


File Origin
# of uploads :
1
# of downloads :
97
Origin country :
DE DE
Vendor Threat Intelligence
Malware configuration found for:
Mirai
Details
Mirai
an XOR decryption key and at least a c2 socket address
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
gafgyt masquerade
Verdict:
Malicious
File Type:
elf.32.be
First seen:
2026-01-06T10:15:00Z UTC
Last seen:
2026-01-06T22:11:00Z UTC
Hits:
~10
Status:
terminated
Behavior Graph:
%3 guuid=347fe805-1a00-0000-4d50-b37070140000 pid=5232 /usr/bin/sudo guuid=76308e07-1a00-0000-4d50-b37071140000 pid=5233 /tmp/sample.bin guuid=347fe805-1a00-0000-4d50-b37070140000 pid=5232->guuid=76308e07-1a00-0000-4d50-b37071140000 pid=5233 execve
Result
Threat name:
n/a
Detection:
malicious
Classification:
spre.troj
Score:
76 / 100
Signature
Antivirus / Scanner detection for submitted sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Reads system files that contain records of logged in users
Sample reads /proc/mounts (often used for finding a writable filesystem)
Sample tries to kill multiple processes (SIGKILL)
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1845448 Sample: Fantazy.m68k.elf Startdate: 06/01/2026 Architecture: LINUX Score: 76 146 154.224.224.146, 23 ZAINUGASUG Uganda 2->146 148 98.137.59.137, 23 YAHOO-GQ1US United States 2->148 150 98 other IPs or domains 2->150 154 Malicious sample detected (through community Yara rule) 2->154 156 Antivirus / Scanner detection for submitted sample 2->156 158 Multi AV Scanner detection for submitted file 2->158 14 systemd gdm3 2->14         started        16 systemd gdm3 2->16         started        18 systemd gdm3 2->18         started        20 92 other processes 2->20 signatures3 process4 file5 24 gdm3 gdm-session-worker 14->24         started        26 gdm3 gdm-session-worker 14->26         started        34 5 other processes 14->34 28 gdm3 gdm-session-worker 16->28         started        36 6 other processes 16->36 30 gdm3 gdm-session-worker 18->30         started        38 3 other processes 18->38 144 /var/log/wtmp, data 20->144 dropped 160 Sample reads /proc/mounts (often used for finding a writable filesystem) 20->160 162 Reads system files that contain records of logged in users 20->162 32 Fantazy.m68k.elf 20->32         started        40 58 other processes 20->40 signatures6 process7 process8 42 gdm-session-worker gdm-x-session 24->42         started        44 gdm-session-worker gdm-wayland-session 26->44         started        46 gdm-session-worker gdm-wayland-session 28->46         started        48 gdm-session-worker gdm-wayland-session 30->48         started        50 Fantazy.m68k.elf 32->50         started        57 2 other processes 32->57 53 gdm-session-worker gdm-x-session 36->53         started        55 language-validate language-options 40->55         started        59 50 other processes 40->59 signatures9 61 gdm-x-session dbus-run-session 42->61         started        63 gdm-x-session Xorg Xorg.wrap Xorg 42->63         started        65 gdm-x-session Default 42->65         started        67 gdm-wayland-session dbus-run-session 44->67         started        69 gdm-wayland-session dbus-run-session 46->69         started        71 gdm-wayland-session dbus-run-session 48->71         started        152 Sample tries to kill multiple processes (SIGKILL) 50->152 73 gdm-x-session Xorg Xorg.wrap Xorg 53->73         started        75 language-options sh 55->75         started        77 2 other processes 59->77 process10 process11 79 dbus-run-session dbus-daemon 61->79         started        82 dbus-run-session gnome-session gnome-session-binary 1 61->82         started        84 Xorg sh 63->84         started        86 dbus-run-session dbus-daemon 67->86         started        88 dbus-run-session gnome-session gnome-session-binary 1 67->88         started        90 2 other processes 69->90 92 2 other processes 71->92 94 2 other processes 75->94 96 4 other processes 77->96 signatures12 168 Sample tries to kill multiple processes (SIGKILL) 79->168 170 Sample reads /proc/mounts (often used for finding a writable filesystem) 79->170 98 dbus-daemon 79->98         started        105 7 other processes 79->105 100 gnome-session-binary sh gnome-shell 82->100         started        107 2 other processes 82->107 103 sh xkbcomp 84->103         started        109 7 other processes 86->109 111 2 other processes 88->111 113 9 other processes 90->113 115 9 other processes 92->115 process13 signatures14 117 dbus-daemon at-spi-bus-launcher 98->117         started        164 Sample reads /proc/mounts (often used for finding a writable filesystem) 100->164 119 gnome-shell ibus-daemon 100->119         started        127 7 other processes 105->127 121 gnome-session-check-accelerated gnome-session-check-accelerated-gl-helper 107->121         started        123 gnome-session-check-accelerated gnome-session-check-accelerated-gles-helper 107->123         started        125 dbus-daemon false 109->125         started        129 6 other processes 109->129 131 7 other processes 113->131 133 7 other processes 115->133 process15 process16 135 at-spi-bus-launcher dbus-daemon 117->135         started        138 ibus-daemon 119->138         started        140 ibus-daemon ibus-memconf 119->140         started        signatures17 166 Sample reads /proc/mounts (often used for finding a writable filesystem) 135->166 142 ibus-daemon ibus-x11 138->142         started        process18
Threat name:
Linux.Worm.Mirai
Status:
Malicious
First seen:
2026-01-06 13:14:19 UTC
File Type:
ELF32 Big (Exe)
AV detection:
18 of 24 (75.00%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:mirai linux
Verdict:
Malicious
Tags:
trojan mirai Unix.Trojan.Mirai-6981989-0
YARA:
Linux_Trojan_Mirai_575f5bc8
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:linux_generic_ipv6_catcher
Author:@_lubiedo
Description:ELF samples using IPv6 addresses
Rule name:Linux_Trojan_Mirai_575f5bc8
Author:Elastic Security
Rule name:SUSP_XORed_Mozilla_Oct19
Author:Florian Roth
Description:Detects suspicious single byte XORed keyword 'Mozilla/5.0' - it uses yara's XOR modifier and therefore cannot print the XOR key. You can use the CyberChef recipe linked in the reference field to brute force the used key.
Reference:https://gchq.github.io/CyberChef/#recipe=XOR_Brute_Force()
Rule name:SUSP_XORed_Mozilla_RID2DB4
Author:Florian Roth
Description:Detects suspicious XORed keyword - Mozilla/5.0
Reference:Internal Research

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

elf a93d680be343103edd02547e64ecb255a9bdaf532056ea59eef656e161ea2f27

(this sample)

  
Delivery method
Distributed via web download

Comments