MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 aeaa7759ab418468fe7d77b9b6ce451a27ed0fccd56024fb448e92d4b1523406. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: aeaa7759ab418468fe7d77b9b6ce451a27ed0fccd56024fb448e92d4b1523406
SHA3-384 hash: 59f6c0f20e77e107b52695063387b0e174063d44f82d7962a57337e98c0f1231cf34faecef9b93cb3a48882f1468c4a8
SHA1 hash: a050def41175cdd73430325dcca4e1c2a75a4c6f
MD5 hash: e85130773196f3802bfa2c20e94527ee
humanhash: connecticut-jig-india-high
File name:mips
Download: download sample
Signature Mirai
File size:34'720 bytes
First seen:2025-08-18 16:51:44 UTC
Last seen:Never
File type: elf
MIME type:application/x-executable
ssdeep 768:8hwVwVBAVCztJohyuBZ6th/si5obDu5N1Z:dGIVStmyYZg0i1Z
TLSH T17BF252453A229FEDF728873947B78B30A74973D227E19684E25CD9041FB034D685FBA8
telfhash t12bf01c2c143852f0d3c58d9e6bedef38a4a184e799761e378950d66aa631a424c00d2c
Magika elf
Reporter abuse_ch
Tags:elf mirai

Intelligence


File Origin
# of uploads :
1
# of downloads :
71
Origin country :
DE DE
Vendor Threat Intelligence
Result
Verdict:
Suspicious
Maliciousness:

Behaviour
Opens a port
Sends data to a server
Receives data from a server
Connection attempt
DNS request
Runs as daemon
Status:
terminated
Behavior Graph:
%3 guuid=83d573a9-1900-0000-e34f-b8f35b0d0000 pid=3419 /usr/bin/sudo guuid=02ac15ab-1900-0000-e34f-b8f3620d0000 pid=3426 /tmp/sample.bin guuid=83d573a9-1900-0000-e34f-b8f35b0d0000 pid=3419->guuid=02ac15ab-1900-0000-e34f-b8f3620d0000 pid=3426 execve guuid=e0b82aac-1900-0000-e34f-b8f3680d0000 pid=3432 /usr/bin/dash guuid=02ac15ab-1900-0000-e34f-b8f3620d0000 pid=3426->guuid=e0b82aac-1900-0000-e34f-b8f3680d0000 pid=3432 clone guuid=ea524dac-1900-0000-e34f-b8f3690d0000 pid=3433 /usr/bin/dash guuid=02ac15ab-1900-0000-e34f-b8f3620d0000 pid=3426->guuid=ea524dac-1900-0000-e34f-b8f3690d0000 pid=3433 clone
Result
Threat name:
n/a
Detection:
malicious
Classification:
n/a
Score:
48 / 100
Signature
Multi AV Scanner detection for submitted file
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1759515 Sample: mips.elf Startdate: 18/08/2025 Architecture: LINUX Score: 48 18 169.254.169.254, 80 USDOSUS Reserved 2->18 20 conn.magicpacketlease.org 45.125.66.90, 23120, 38510, 38512 TELE-ASTeleAsiaLimitedHK Hong Kong 2->20 22 daisy.ubuntu.com 2->22 24 Multi AV Scanner detection for submitted file 2->24 8 mips.elf 2->8         started        10 python3.8 dpkg 2->10         started        signatures3 process4 process5 12 mips.elf 8->12         started        process6 14 mips.elf 12->14         started        16 mips.elf 12->16         started       
Threat name:
Linux.Worm.Mirai
Status:
Malicious
First seen:
2025-08-18 16:52:38 UTC
File Type:
ELF32 Big (Exe)
AV detection:
15 of 38 (39.47%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
discovery
Behaviour
System Network Configuration Discovery
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

elf aeaa7759ab418468fe7d77b9b6ce451a27ed0fccd56024fb448e92d4b1523406

(this sample)

  
Delivery method
Distributed via web download

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_NXMissing Non-Executable Memory Protectioncritical
CHECK_PIEMissing Position-Independent Executable (PIE) Protectionhigh

Comments