MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 b137e7049facd81bf0e15a0bb6b0135732a43e126b799e903798f05ef87ca98e. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 11


Intelligence 11 IOCs YARA 5 File information Comments

SHA256 hash: b137e7049facd81bf0e15a0bb6b0135732a43e126b799e903798f05ef87ca98e
SHA3-384 hash: ab6391fdd22e1c17cd64986c835a79d8c8a17bc1666be23b1253be30aae10b00599834d2a90098567ede479410aab9f7
SHA1 hash: 4169a0cfd20d21d3945302db897a1c2cc5966060
MD5 hash: a3dd4625014def9f9cfe251b0eddea45
humanhash: muppet-alanine-oranges-ohio
File name:x86
Download: download sample
Signature Mirai
File size:51'408 bytes
First seen:2025-09-02 20:40:35 UTC
Last seen:2025-09-24 08:54:13 UTC
File type: elf
MIME type:application/x-executable
ssdeep 1536:p4wAB+809W+tERDEZWdC8eS+WPp/AxzcTga:SwC+dOoZEeS+WPp8zB
TLSH T1C3336CC7B603D9F9EC5215710037A7665FB6F93A253AEA43D7A22931AC13B10A70B35C
telfhash t16831e8b73e6a0cecb740ac48d32e5ac71d1ac73b269171f840f2680527f2d9490b5439
TrID 50.1% (.) ELF Executable and Linkable format (Linux) (4022/12)
49.8% (.O) ELF Executable and Linkable format (generic) (4000/1)
Magika elf
Reporter abuse_ch
Tags:elf mirai

Intelligence


File Origin
# of uploads :
2
# of downloads :
42
Origin country :
DE DE
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Sends data to a server
Receives data from a server
Connection attempt
Mounts file systems
Runs as daemon
Substitutes an application name
Verdict:
Malicious
Uses P2P?:
false
Uses anti-vm?:
false
Architecture:
x86
Packer:
not packed
Botnet:
unknown
Number of open files:
50
Number of processes launched:
3
Processes remaning?
false
Remote TCP ports scanned:
not identified
Behaviour
no suspicious findings
Botnet C2s
TCP botnet C2(s):
not identified
UDP botnet C2(s):
not identified
Verdict:
Malicious
File Type:
elf.32.le
First seen:
2025-09-04T01:06:00Z UTC
Last seen:
2025-09-04T01:06:00Z UTC
Hits:
~10
Status:
terminated
Behavior Graph:
%3 guuid=1b562c33-1b00-0000-2d36-f45b8f0b0000 pid=2959 /usr/bin/sudo guuid=43a2c635-1b00-0000-2d36-f45b950b0000 pid=2965 /tmp/sample.bin guuid=1b562c33-1b00-0000-2d36-f45b8f0b0000 pid=2959->guuid=43a2c635-1b00-0000-2d36-f45b950b0000 pid=2965 execve guuid=887cba3e-1b00-0000-2d36-f45bac0b0000 pid=2988 /tmp/sample.bin net send-data guuid=43a2c635-1b00-0000-2d36-f45b950b0000 pid=2965->guuid=887cba3e-1b00-0000-2d36-f45bac0b0000 pid=2988 clone guuid=e817d83e-1b00-0000-2d36-f45bad0b0000 pid=2989 /tmp/sample.bin net send-data guuid=43a2c635-1b00-0000-2d36-f45b950b0000 pid=2965->guuid=e817d83e-1b00-0000-2d36-f45bad0b0000 pid=2989 clone guuid=82e2b145-1b00-0000-2d36-f45bc60b0000 pid=3014 /tmp/sample.bin guuid=43a2c635-1b00-0000-2d36-f45b950b0000 pid=2965->guuid=82e2b145-1b00-0000-2d36-f45bc60b0000 pid=3014 clone d7e75a5d-65d1-5941-aac4-e4015a0a0899 31.56.39.76:6969 guuid=887cba3e-1b00-0000-2d36-f45bac0b0000 pid=2988->d7e75a5d-65d1-5941-aac4-e4015a0a0899 send: 36B guuid=e817d83e-1b00-0000-2d36-f45bad0b0000 pid=2989->d7e75a5d-65d1-5941-aac4-e4015a0a0899 send: 46B guuid=5082ec45-1b00-0000-2d36-f45bc70b0000 pid=3015 /tmp/sample.bin net send-data write-file zombie guuid=82e2b145-1b00-0000-2d36-f45bc60b0000 pid=3014->guuid=5082ec45-1b00-0000-2d36-f45bc70b0000 pid=3015 clone 8b0a01dc-0728-52c1-8024-c4ba7801b8d6 8.8.8.8:53 guuid=5082ec45-1b00-0000-2d36-f45bc70b0000 pid=3015->8b0a01dc-0728-52c1-8024-c4ba7801b8d6 con d41ff612-c494-5ad2-835e-cba99e77da4d 194.113.37.21:1025 guuid=5082ec45-1b00-0000-2d36-f45bc70b0000 pid=3015->d41ff612-c494-5ad2-835e-cba99e77da4d send: 52B e9010b07-def5-5d53-bd9f-ed886898ca33 103.136.69.242:1025 guuid=5082ec45-1b00-0000-2d36-f45bc70b0000 pid=3015->e9010b07-def5-5d53-bd9f-ed886898ca33 con b2c2ad8f-4321-5ca8-994b-072c20344629 31.59.120.38:1025 guuid=5082ec45-1b00-0000-2d36-f45bc70b0000 pid=3015->b2c2ad8f-4321-5ca8-994b-072c20344629 send: 36B db96774e-46a5-59dd-83b1-9c87ef6aad62 104.252.127.190:1025 guuid=5082ec45-1b00-0000-2d36-f45bc70b0000 pid=3015->db96774e-46a5-59dd-83b1-9c87ef6aad62 send: 26B 2b659683-be59-5022-8f04-927e151f5c7e 217.60.248.199:1025 guuid=5082ec45-1b00-0000-2d36-f45bc70b0000 pid=3015->2b659683-be59-5022-8f04-927e151f5c7e send: 24B ef45816d-a8af-52a5-bd2c-76d22ae1894f 94.183.184.60:1025 guuid=5082ec45-1b00-0000-2d36-f45bc70b0000 pid=3015->ef45816d-a8af-52a5-bd2c-76d22ae1894f send: 38B 8ec24d88-10a2-533e-9815-5add425c4ddb 109.248.162.59:1025 guuid=5082ec45-1b00-0000-2d36-f45bc70b0000 pid=3015->8ec24d88-10a2-533e-9815-5add425c4ddb send: 50B 97202e5a-0145-5b2c-b892-9514ea1b5595 217.60.248.121:1025 guuid=5082ec45-1b00-0000-2d36-f45bc70b0000 pid=3015->97202e5a-0145-5b2c-b892-9514ea1b5595 send: 12B c6203332-51f0-5ada-b496-18efd14e4d3d 217.60.249.53:1025 guuid=5082ec45-1b00-0000-2d36-f45bc70b0000 pid=3015->c6203332-51f0-5ada-b496-18efd14e4d3d send: 24B b3f9ddf4-8780-52e1-b41d-9c4a140190dd 196.251.83.20:1025 guuid=5082ec45-1b00-0000-2d36-f45bc70b0000 pid=3015->b3f9ddf4-8780-52e1-b41d-9c4a140190dd send: 38B e0076ade-3500-5392-864f-dd3a5fa667e3 185.186.26.135:1025 guuid=5082ec45-1b00-0000-2d36-f45bc70b0000 pid=3015->e0076ade-3500-5392-864f-dd3a5fa667e3 con guuid=9df9ba4e-1b00-0000-2d36-f45bef0b0000 pid=3055 /tmp/sample.bin guuid=5082ec45-1b00-0000-2d36-f45bc70b0000 pid=3015->guuid=9df9ba4e-1b00-0000-2d36-f45bef0b0000 pid=3055 clone guuid=5d38a861-1c00-0000-2d36-f45b3d0e0000 pid=3645 /tmp/sample.bin net send-data guuid=9df9ba4e-1b00-0000-2d36-f45bef0b0000 pid=3055->guuid=5d38a861-1c00-0000-2d36-f45b3d0e0000 pid=3645 clone guuid=2402de61-1c00-0000-2d36-f45b3f0e0000 pid=3647 /tmp/sample.bin net send-data guuid=9df9ba4e-1b00-0000-2d36-f45bef0b0000 pid=3055->guuid=2402de61-1c00-0000-2d36-f45b3f0e0000 pid=3647 clone guuid=ee7a7e65-1c00-0000-2d36-f45b4b0e0000 pid=3659 /tmp/sample.bin net send-data guuid=9df9ba4e-1b00-0000-2d36-f45bef0b0000 pid=3055->guuid=ee7a7e65-1c00-0000-2d36-f45b4b0e0000 pid=3659 clone guuid=bdb1487a-1c00-0000-2d36-f45b990e0000 pid=3737 /tmp/sample.bin net send-data guuid=9df9ba4e-1b00-0000-2d36-f45bef0b0000 pid=3055->guuid=bdb1487a-1c00-0000-2d36-f45b990e0000 pid=3737 clone guuid=0546277e-1c00-0000-2d36-f45ba60e0000 pid=3750 /tmp/sample.bin net send-data guuid=9df9ba4e-1b00-0000-2d36-f45bef0b0000 pid=3055->guuid=0546277e-1c00-0000-2d36-f45ba60e0000 pid=3750 clone guuid=e2edec81-1c00-0000-2d36-f45bb20e0000 pid=3762 /tmp/sample.bin net send-data guuid=9df9ba4e-1b00-0000-2d36-f45bef0b0000 pid=3055->guuid=e2edec81-1c00-0000-2d36-f45bb20e0000 pid=3762 clone guuid=440cfe85-1c00-0000-2d36-f45bc10e0000 pid=3777 /tmp/sample.bin net send-data guuid=9df9ba4e-1b00-0000-2d36-f45bef0b0000 pid=3055->guuid=440cfe85-1c00-0000-2d36-f45bc10e0000 pid=3777 clone guuid=ce16c889-1c00-0000-2d36-f45bce0e0000 pid=3790 /tmp/sample.bin net send-data guuid=9df9ba4e-1b00-0000-2d36-f45bef0b0000 pid=3055->guuid=ce16c889-1c00-0000-2d36-f45bce0e0000 pid=3790 clone guuid=8466908c-1c00-0000-2d36-f45bd90e0000 pid=3801 /tmp/sample.bin net send-data guuid=9df9ba4e-1b00-0000-2d36-f45bef0b0000 pid=3055->guuid=8466908c-1c00-0000-2d36-f45bd90e0000 pid=3801 clone guuid=868a4591-1c00-0000-2d36-f45be50e0000 pid=3813 /tmp/sample.bin net send-data guuid=9df9ba4e-1b00-0000-2d36-f45bef0b0000 pid=3055->guuid=868a4591-1c00-0000-2d36-f45be50e0000 pid=3813 clone guuid=a2caff94-1c00-0000-2d36-f45bf20e0000 pid=3826 /tmp/sample.bin net send-data guuid=9df9ba4e-1b00-0000-2d36-f45bef0b0000 pid=3055->guuid=a2caff94-1c00-0000-2d36-f45bf20e0000 pid=3826 clone guuid=595cd897-1c00-0000-2d36-f45bfd0e0000 pid=3837 /tmp/sample.bin net send-data guuid=9df9ba4e-1b00-0000-2d36-f45bef0b0000 pid=3055->guuid=595cd897-1c00-0000-2d36-f45bfd0e0000 pid=3837 clone guuid=bbfffe9a-1c00-0000-2d36-f45b080f0000 pid=3848 /tmp/sample.bin net send-data guuid=9df9ba4e-1b00-0000-2d36-f45bef0b0000 pid=3055->guuid=bbfffe9a-1c00-0000-2d36-f45b080f0000 pid=3848 clone guuid=b2405d9e-1c00-0000-2d36-f45b130f0000 pid=3859 /tmp/sample.bin net send-data guuid=9df9ba4e-1b00-0000-2d36-f45bef0b0000 pid=3055->guuid=b2405d9e-1c00-0000-2d36-f45b130f0000 pid=3859 clone guuid=6efef1a0-1c00-0000-2d36-f45b1e0f0000 pid=3870 /tmp/sample.bin net send-data guuid=9df9ba4e-1b00-0000-2d36-f45bef0b0000 pid=3055->guuid=6efef1a0-1c00-0000-2d36-f45b1e0f0000 pid=3870 clone guuid=e06a6aae-1c00-0000-2d36-f45b4c0f0000 pid=3916 /tmp/sample.bin net send-data guuid=9df9ba4e-1b00-0000-2d36-f45bef0b0000 pid=3055->guuid=e06a6aae-1c00-0000-2d36-f45b4c0f0000 pid=3916 clone guuid=fadeb3b8-1c00-0000-2d36-f45b6a0f0000 pid=3946 /tmp/sample.bin net send-data guuid=9df9ba4e-1b00-0000-2d36-f45bef0b0000 pid=3055->guuid=fadeb3b8-1c00-0000-2d36-f45b6a0f0000 pid=3946 clone guuid=5b35a2bc-1c00-0000-2d36-f45b760f0000 pid=3958 /tmp/sample.bin net send-data guuid=9df9ba4e-1b00-0000-2d36-f45bef0b0000 pid=3055->guuid=5b35a2bc-1c00-0000-2d36-f45b760f0000 pid=3958 clone guuid=28c433c0-1c00-0000-2d36-f45b820f0000 pid=3970 /tmp/sample.bin net send-data guuid=9df9ba4e-1b00-0000-2d36-f45bef0b0000 pid=3055->guuid=28c433c0-1c00-0000-2d36-f45b820f0000 pid=3970 clone guuid=6d9b49c5-1c00-0000-2d36-f45b900f0000 pid=3984 /tmp/sample.bin net send-data guuid=9df9ba4e-1b00-0000-2d36-f45bef0b0000 pid=3055->guuid=6d9b49c5-1c00-0000-2d36-f45b900f0000 pid=3984 clone guuid=cac0a0c5-1c00-0000-2d36-f45b920f0000 pid=3986 /tmp/sample.bin net send-data guuid=9df9ba4e-1b00-0000-2d36-f45bef0b0000 pid=3055->guuid=cac0a0c5-1c00-0000-2d36-f45b920f0000 pid=3986 clone guuid=e6381fca-1c00-0000-2d36-f45ba30f0000 pid=4003 /tmp/sample.bin net send-data guuid=9df9ba4e-1b00-0000-2d36-f45bef0b0000 pid=3055->guuid=e6381fca-1c00-0000-2d36-f45ba30f0000 pid=4003 clone guuid=5d38a861-1c00-0000-2d36-f45b3d0e0000 pid=3645->d7e75a5d-65d1-5941-aac4-e4015a0a0899 send: 78B guuid=2402de61-1c00-0000-2d36-f45b3f0e0000 pid=3647->d7e75a5d-65d1-5941-aac4-e4015a0a0899 send: 78B guuid=ee7a7e65-1c00-0000-2d36-f45b4b0e0000 pid=3659->d7e75a5d-65d1-5941-aac4-e4015a0a0899 send: 78B guuid=bdb1487a-1c00-0000-2d36-f45b990e0000 pid=3737->d7e75a5d-65d1-5941-aac4-e4015a0a0899 send: 42B guuid=0546277e-1c00-0000-2d36-f45ba60e0000 pid=3750->d7e75a5d-65d1-5941-aac4-e4015a0a0899 send: 78B guuid=e2edec81-1c00-0000-2d36-f45bb20e0000 pid=3762->d7e75a5d-65d1-5941-aac4-e4015a0a0899 send: 78B guuid=440cfe85-1c00-0000-2d36-f45bc10e0000 pid=3777->d7e75a5d-65d1-5941-aac4-e4015a0a0899 send: 78B guuid=ce16c889-1c00-0000-2d36-f45bce0e0000 pid=3790->d7e75a5d-65d1-5941-aac4-e4015a0a0899 send: 78B guuid=8466908c-1c00-0000-2d36-f45bd90e0000 pid=3801->d7e75a5d-65d1-5941-aac4-e4015a0a0899 send: 78B guuid=868a4591-1c00-0000-2d36-f45be50e0000 pid=3813->d7e75a5d-65d1-5941-aac4-e4015a0a0899 send: 78B guuid=a2caff94-1c00-0000-2d36-f45bf20e0000 pid=3826->d7e75a5d-65d1-5941-aac4-e4015a0a0899 send: 78B guuid=595cd897-1c00-0000-2d36-f45bfd0e0000 pid=3837->d7e75a5d-65d1-5941-aac4-e4015a0a0899 send: 78B guuid=bbfffe9a-1c00-0000-2d36-f45b080f0000 pid=3848->d7e75a5d-65d1-5941-aac4-e4015a0a0899 send: 78B guuid=b2405d9e-1c00-0000-2d36-f45b130f0000 pid=3859->d7e75a5d-65d1-5941-aac4-e4015a0a0899 send: 78B guuid=6efef1a0-1c00-0000-2d36-f45b1e0f0000 pid=3870->d7e75a5d-65d1-5941-aac4-e4015a0a0899 send: 78B guuid=e06a6aae-1c00-0000-2d36-f45b4c0f0000 pid=3916->d7e75a5d-65d1-5941-aac4-e4015a0a0899 send: 78B guuid=fadeb3b8-1c00-0000-2d36-f45b6a0f0000 pid=3946->d7e75a5d-65d1-5941-aac4-e4015a0a0899 send: 78B guuid=5b35a2bc-1c00-0000-2d36-f45b760f0000 pid=3958->d7e75a5d-65d1-5941-aac4-e4015a0a0899 send: 78B guuid=28c433c0-1c00-0000-2d36-f45b820f0000 pid=3970->d7e75a5d-65d1-5941-aac4-e4015a0a0899 send: 78B guuid=6d9b49c5-1c00-0000-2d36-f45b900f0000 pid=3984->d7e75a5d-65d1-5941-aac4-e4015a0a0899 send: 78B guuid=cac0a0c5-1c00-0000-2d36-f45b920f0000 pid=3986->d7e75a5d-65d1-5941-aac4-e4015a0a0899 send: 33B guuid=e6381fca-1c00-0000-2d36-f45ba30f0000 pid=4003->d7e75a5d-65d1-5941-aac4-e4015a0a0899 send: 78B
Result
Threat name:
n/a
Detection:
malicious
Classification:
spre.troj
Score:
64 / 100
Signature
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Sample reads /proc/mounts (often used for finding a writable filesystem)
Sample tries to kill multiple processes (SIGKILL)
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1769881 Sample: x86.elf Startdate: 02/09/2025 Architecture: LINUX Score: 64 40 Malicious sample detected (through community Yara rule) 2->40 42 Multi AV Scanner detection for submitted file 2->42 9 x86.elf 2->9         started        process3 signatures4 46 Sample tries to kill multiple processes (SIGKILL) 9->46 48 Sample reads /proc/mounts (often used for finding a writable filesystem) 9->48 12 x86.elf 9->12         started        14 x86.elf 9->14         started        16 x86.elf 9->16         started        18 2 other processes 9->18 process5 process6 20 x86.elf 12->20         started        process7 22 x86.elf 20->22         started        25 x86.elf 20->25         started        signatures8 44 Sample tries to kill multiple processes (SIGKILL) 22->44 27 x86.elf 22->27         started        29 x86.elf 22->29         started        31 x86.elf 22->31         started        36 15 other processes 22->36 33 x86.elf 25->33         started        process9 signatures10 38 Sample tries to kill multiple processes (SIGKILL) 33->38
Threat name:
Linux.Worm.Mirai
Status:
Malicious
First seen:
2025-09-02 20:41:29 UTC
File Type:
ELF32 Little (Exe)
AV detection:
16 of 24 (66.67%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  6/10
Tags:
credential_access discovery linux
Behaviour
Reads runtime system information
Changes its process name
Reads process memory
Enumerates running processes
Verdict:
Malicious
Tags:
Unix.Trojan.Mirai-9970440-0
YARA:
n/a
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:CP_AllMal_Detector
Author:DiegoAnalytics
Description:CrossPlatform All Malwares Detector: Detect PE, ELF, Mach-O, scripts, archives; overlay, obfuscation, encryption, spoofing, hiding, high entropy, network communication
Rule name:CP_Script_Inject_Detector
Author:DiegoAnalytics
Description:Detects attempts to inject code into another process across PE, ELF, Mach-O binaries
Rule name:linux_generic_ipv6_catcher
Author:@_lubiedo
Description:ELF samples using IPv6 addresses
Rule name:Linux_Trojan_Mirai_389ee3e9
Author:Elastic Security
Rule name:Linux_Trojan_Mirai_cc93863b
Author:Elastic Security

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

elf b137e7049facd81bf0e15a0bb6b0135732a43e126b799e903798f05ef87ca98e

(this sample)

  
Delivery method
Distributed via web download

Comments