MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 b6b42107ac8e1be665499e1358deba9700382b2704f52924261cbce9ae812048. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 8


Intelligence 8 IOCs YARA File information Comments 1

SHA256 hash: b6b42107ac8e1be665499e1358deba9700382b2704f52924261cbce9ae812048
SHA3-384 hash: 4314fcfd1edfb9dfa31200fab689e83839a56455dcf84865394db8b384f104ac36d302d72fd50dabf73ea65b65765ee8
SHA1 hash: f714e1df2afb3f572a465895c6f95492a5eb45ff
MD5 hash: d522041734dbd373172561d4b8b5e776
humanhash: xray-artist-six-cola
File name:d522041734dbd373172561d4b8b5e776
Download: download sample
Signature Mirai
File size:24'996 bytes
First seen:2022-06-03 12:53:19 UTC
Last seen:Never
File type: elf
MIME type:application/x-executable
ssdeep 768:V96d0Y8OWVvy+rG5PHWHb9J5Fpl4c9kdMTs1s3Uozd:V9CW1MHW79zlbSAzd
TLSH T158B2D021D36F29F1E7200071847CC98632C41AB4E5FDA6F216165B58E7E710ABBB4DDB
TrID 50.1% (.) ELF Executable and Linkable format (Linux) (4022/12)
49.8% (.O) ELF Executable and Linkable format (generic) (4000/1)
Reporter zbetcheckin
Tags:32 arm elf mirai

Intelligence


File Origin
# of uploads :
1
# of downloads :
376
Origin country :
n/a
Vendor Threat Intelligence
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
anti-debug
Verdict:
Malicious
Uses P2P?:
false
Uses anti-vm?:
false
Architecture:
arm
Packer:
UPX
Botnet:
unknown
Number of open files:
32
Number of processes launched:
6
Processes remaning?
false
Remote TCP ports scanned:
23
Behaviour
Information Gathering
Botnet C2s
TCP botnet C2(s):
62.197.136.92:9506
UDP botnet C2(s):
not identified
Result
Verdict:
UNKNOWN
Result
Threat name:
Detection:
malicious
Classification:
troj.evad
Score:
64 / 100
Signature
Multi AV Scanner detection for submitted file
Sample is packed with UPX
Uses known network protocols on non-standard ports
Yara detected Mirai
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 638846 Sample: 52eFMJemTw Startdate: 03/06/2022 Architecture: LINUX Score: 64 22 78.153.177.222, 23 ZENSYSTEMS-ASDK Denmark 2->22 24 65.105.188.115 XO-AS15US United States 2->24 26 98 other IPs or domains 2->26 28 Multi AV Scanner detection for submitted file 2->28 30 Yara detected Mirai 2->30 32 Uses known network protocols on non-standard ports 2->32 34 Sample is packed with UPX 2->34 8 52eFMJemTw 2->8         started        signatures3 process4 process5 10 52eFMJemTw 8->10         started        12 52eFMJemTw 8->12         started        14 52eFMJemTw 8->14         started        process6 16 52eFMJemTw 10->16         started        18 52eFMJemTw 10->18         started        20 52eFMJemTw 10->20         started       
Threat name:
Linux.Trojan.Mirai
Status:
Malicious
First seen:
2022-06-03 12:54:05 UTC
File Type:
ELF32 Little (Exe)
AV detection:
18 of 26 (69.23%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  1/10
Tags:
linux
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

elf b6b42107ac8e1be665499e1358deba9700382b2704f52924261cbce9ae812048

(this sample)

  
Delivery method
Distributed via web download

Comments



Avatar
zbet commented on 2022-06-03 12:53:23 UTC

url : hxxp://62.197.136.92/xnxx/vailon.arm5