MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 b93dc603733662d5c5334167603583b0d1dec694685c1d59f5e3b0d95188ab49. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 8


Intelligence 8 IOCs YARA 8 File information Comments

SHA256 hash: b93dc603733662d5c5334167603583b0d1dec694685c1d59f5e3b0d95188ab49
SHA3-384 hash: af3b277aa805523ff5d3e5a0f540b1e045524d700942d5678a7e2d3f969d64669218f74750bc10b8653e95389770bbe5
SHA1 hash: b48a052b4d44d1bf0b1d1afd49e591270d17aa50
MD5 hash: 09e21ce5ced2aada28389449e7556325
humanhash: princess-queen-crazy-fillet
File name:mips
Download: download sample
Signature Mirai
File size:315'728 bytes
First seen:2026-01-04 19:32:28 UTC
Last seen:Never
File type: elf
MIME type:application/x-sharedlib
ssdeep 6144:YDoIJkjxB5h+pR03bJJQUegxV8oZ9Sv1hw+0UOgbu+6zJN:wo26KgDqXXOW6zJN
TLSH T1EC64C5BA7750BF9AC378C23805F347E996B2235116A38505E12DCA3C1DA138C5DDFEA9
telfhash t1b721615a093ec459aeb349449c6c1695a10f8a23ac921e22ef1ccb9448f910fe008fef
Magika elf
Reporter abuse_ch
Tags:elf mirai upx-dec


Avatar
abuse_ch
UPX decompressed file, sourced from SHA256 1c9b1a4fe6eccfc41f32f27e801701c503fcbb9fdba0d4f3c11f92fc65d08dd7
File size (compressed) :124'188 bytes
File size (de-compressed) :315'728 bytes
Format:linux/mips
Packed file: 1c9b1a4fe6eccfc41f32f27e801701c503fcbb9fdba0d4f3c11f92fc65d08dd7

Intelligence


File Origin
# of uploads :
1
# of downloads :
74
Origin country :
NL NL
Vendor Threat Intelligence
No detections
Result
Verdict:
Malware
Maliciousness:

Behaviour
Connection attempt
Sends data to a server
Receives data from a server
Substitutes an application name
Verdict:
Unknown
Threat level:
  2.5/10
Confidence:
100%
Tags:
gcc mirai
Verdict:
Malicious
File Type:
elf.32.be
First seen:
2026-01-04T18:48:00Z UTC
Last seen:
2026-01-04T20:37:00Z UTC
Hits:
~10
Status:
terminated
Behavior Graph:
%3 guuid=1d637f3d-1a00-0000-2a03-894af1090000 pid=2545 /usr/bin/sudo guuid=837a4d3f-1a00-0000-2a03-894af5090000 pid=2549 /tmp/sample.bin guuid=1d637f3d-1a00-0000-2a03-894af1090000 pid=2545->guuid=837a4d3f-1a00-0000-2a03-894af5090000 pid=2549 execve
Gathering data
Result
Threat name:
n/a
Detection:
malicious
Classification:
n/a
Score:
52 / 100
Signature
Contains symbols with names commonly found in malware
Multi AV Scanner detection for submitted file
Behaviour
Behavior Graph:
Threat name:
Linux.Backdoor.Mirai
Status:
Malicious
First seen:
2026-01-04 19:33:14 UTC
File Type:
ELF32 Big (SO)
AV detection:
10 of 24 (41.67%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  4/10
Tags:
discovery
Behaviour
Reads runtime system information
System Network Configuration Discovery
Changes its process name
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:CP_Script_Inject_Detector
Author:DiegoAnalytics
Description:Detects attempts to inject code into another process across PE, ELF, Mach-O binaries
Rule name:DetectEncryptedVariants
Author:Zinyth
Description:Detects 'encrypted' in ASCII, Unicode, base64, or hex-encoded
Rule name:elf_arm_mips_ko_so
Rule name:iot_req_metachar
Rule name:RANSOMWARE
Author:ToroGuitar
Rule name:setsockopt
Author:Tim Brown @timb_machine
Description:Hunts for setsockopt() red flags
Rule name:testlumma
Rule name:unixredflags3
Author:Tim Brown @timb_machine
Description:Hunts for UNIX red flags

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

elf b93dc603733662d5c5334167603583b0d1dec694685c1d59f5e3b0d95188ab49

(this sample)

  
Delivery method
Distributed via web download

Comments