MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 baf58c8b685e602fc75a3591005d3f9f2bfc5ea0ccce6bf54e542a29fe5cd048. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 4


Intelligence 4 IOCs YARA 1 File information Comments

SHA256 hash: baf58c8b685e602fc75a3591005d3f9f2bfc5ea0ccce6bf54e542a29fe5cd048
SHA3-384 hash: c143bd8b39b20eb3e91913d34c97dd9ce30963e11bbeb86f1727765104d5828f457dba48767a16f529aa9b934f5505ac
SHA1 hash: 7eb5e7268e427650deae27bce06a0c9f149fde73
MD5 hash: 5cc35b730981e493e90886ac448e828b
humanhash: delaware-shade-quebec-cat
File name:kitty.m68k
Download: download sample
Signature Mirai
File size:59'212 bytes
First seen:2025-08-21 01:30:43 UTC
Last seen:Never
File type: elf
MIME type:application/x-sharedlib
ssdeep 768:mma0WvPwTpz4ebXRtaiRJgwk7TIw3YQhp2Shn+05YZZ2eMHIgxEf4kPfjJXaSLEh:m/Y9c0gwI9Y706ZoBk3taSQr/F
TLSH T176437D96B39E3D6EE0D32C79C56A87167F1CD964D802174290BDBE131AF32A10F259C7
telfhash t16a9002b25b2165226851d40841e54711211fc0051939f523d400048c504610e011584f
Magika elf
Reporter abuse_ch
Tags:elf mirai

Intelligence


File Origin
# of uploads :
1
# of downloads :
86
Origin country :
DE DE
Vendor Threat Intelligence
Verdict:
Unknown
Threat level:
  2.5/10
Confidence:
100%
Tags:
gcc masquerade threat
Status:
terminated
Behavior Graph:
%3 guuid=75933cb7-1600-0000-1fdb-0805f20c0000 pid=3314 /usr/bin/sudo guuid=327611ba-1600-0000-1fdb-0805f40c0000 pid=3316 /tmp/sample.bin guuid=75933cb7-1600-0000-1fdb-0805f20c0000 pid=3314->guuid=327611ba-1600-0000-1fdb-0805f40c0000 pid=3316 execve
Result
Threat name:
n/a
Detection:
suspicious
Classification:
n/a
Score:
21 / 100
Signature
Contains symbols with names commonly found in malware
Behaviour
Behavior Graph:
Threat name:
Linux.Worm.Mirai
Status:
Malicious
First seen:
2025-08-21 01:31:42 UTC
File Type:
ELF32 Big (SO)
AV detection:
9 of 24 (37.50%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  1/10
Tags:
linux
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:CP_AllMal_Detector
Author:DiegoAnalytics
Description:CrossPlatform All Malwares Detector: Detect PE, ELF, Mach-O, scripts, archives; overlay, obfuscation, encryption, spoofing, hiding, high entropy, network communication

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

elf baf58c8b685e602fc75a3591005d3f9f2bfc5ea0ccce6bf54e542a29fe5cd048

(this sample)

  
Delivery method
Distributed via web download

Comments