MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 acac867677391173f80d4458d187f7c11d7e778e5611b4d43312bf5df2d53805. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 7


Intelligence 7 IOCs YARA 2 File information Comments 1

SHA256 hash: acac867677391173f80d4458d187f7c11d7e778e5611b4d43312bf5df2d53805
SHA3-384 hash: c446862ceabb5f12866315e1e2f584ae1beb309b3f3fd3fd20f8b8f09c72f620f14c490198b99c9ad93c49aac8d97080
SHA1 hash: cabcfd4bfaeb6d7c2a7b455ea933128ae7275dd9
MD5 hash: 441176795bdb9d49bddbae2a7dad3d71
humanhash: tennis-michigan-rugby-tango
File name:441176795bdb9d49bddbae2a7dad3d71
Download: download sample
Signature Mirai
File size:36'572 bytes
First seen:2023-02-26 15:04:09 UTC
Last seen:Never
File type: elf
MIME type:application/x-executable
ssdeep 768:qWtO+PqIEP5aGuilC5qxZPFiIm80nIxsJL9nN4uVcqgw09S:q+vqIEPkGQ5qbFih8JxsJL9nN4u+qgw/
TLSH T116F2F1FCEA0ECD0BFEBF74615D7297485BE09B9D3225CE8AC14D9D0141C6097221CA5D
TrID 50.1% (.) ELF Executable and Linkable format (Linux) (4022/12)
49.8% (.O) ELF Executable and Linkable format (generic) (4000/1)
Reporter zbetcheckin
Tags:32 elf mirai powerpc

Intelligence


File Origin
# of uploads :
1
# of downloads :
76
Origin country :
n/a
Vendor Threat Intelligence
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
anti-debug exploit mirai
Result
Verdict:
MALICIOUS
Result
Threat name:
Unknown
Detection:
malicious
Classification:
spre.troj.evad
Score:
72 / 100
Signature
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Reads system files that contain records of logged in users
Sample is packed with UPX
Sample reads /proc/mounts (often used for finding a writable filesystem)
Sample tries to kill multiple processes (SIGKILL)
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 815496 Sample: 1azA8deia9.elf Startdate: 26/02/2023 Architecture: LINUX Score: 72 85 155.47.157.243, 23 WHEATON-COLLEGEUS United States 2->85 87 161.179.27.19, 23 WAL-MARTUS United States 2->87 89 98 other IPs or domains 2->89 93 Malicious sample detected (through community Yara rule) 2->93 95 Multi AV Scanner detection for submitted file 2->95 97 Sample is packed with UPX 2->97 11 gdm3 gdm-session-worker 2->11         started        13 1azA8deia9.elf 2->13         started        15 systemd accounts-daemon 2->15         started        18 15 other processes 2->18 signatures3 process4 signatures5 20 gdm-session-worker gdm-wayland-session 11->20         started        22 1azA8deia9.elf 13->22         started        24 1azA8deia9.elf 13->24         started        27 1azA8deia9.elf 13->27         started        103 Reads system files that contain records of logged in users 15->103 29 accounts-daemon language-validate 15->29         started        105 Sample reads /proc/mounts (often used for finding a writable filesystem) 18->105 31 gdm-session-worker gdm-x-session 18->31         started        33 gnome-shell ibus-daemon 18->33         started        process6 signatures7 35 gdm-wayland-session dbus-run-session 20->35         started        37 1azA8deia9.elf 22->37         started        40 1azA8deia9.elf 22->40         started        42 1azA8deia9.elf 22->42         started        101 Sample tries to kill multiple processes (SIGKILL) 24->101 44 language-validate language-options 29->44         started        46 gdm-x-session Xorg Xorg.wrap Xorg 31->46         started        process8 signatures9 48 dbus-run-session dbus-daemon 35->48         started        51 dbus-run-session gnome-session gnome-session-binary 1 35->51         started        99 Sample tries to kill multiple processes (SIGKILL) 37->99 53 language-options sh 44->53         started        process10 signatures11 91 Sample reads /proc/mounts (often used for finding a writable filesystem) 48->91 55 dbus-daemon 48->55         started        57 dbus-daemon 48->57         started        59 dbus-daemon 48->59         started        69 4 other processes 48->69 61 gnome-session-binary sh gnome-shell 51->61         started        63 gnome-session-binary session-migration 51->63         started        65 sh locale 53->65         started        67 sh grep 53->67         started        process12 process13 71 dbus-daemon false 55->71         started        73 dbus-daemon false 57->73         started        75 dbus-daemon false 59->75         started        77 dbus-daemon false 69->77         started        79 dbus-daemon false 69->79         started        81 dbus-daemon false 69->81         started        83 dbus-daemon false 69->83         started       
Threat name:
Linux.Trojan.Mirai
Status:
Malicious
First seen:
2023-02-26 15:05:07 UTC
File Type:
ELF32 Big (Exe)
AV detection:
18 of 25 (72.00%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  1/10
Tags:
linux
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:linux_generic_ipv6_catcher
Author:@_lubiedo
Description:ELF samples using IPv6 addresses
Rule name:SUSP_ELF_LNX_UPX_Compressed_File
Author:Florian Roth (Nextron Systems)
Description:Detects a suspicious ELF binary with UPX compression
Reference:Internal Research

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

elf acac867677391173f80d4458d187f7c11d7e778e5611b4d43312bf5df2d53805

(this sample)

  
Delivery method
Distributed via web download

Comments



Avatar
zbet commented on 2023-02-26 15:04:12 UTC

url : hxxp://212.87.204.161/d/hotnet.ppc