MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 c1d70983fbdfe65ec68a3813f7f970449b49aefdbc255ebb55e9cbcdd2a9abf9. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Moobot


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments 1

SHA256 hash: c1d70983fbdfe65ec68a3813f7f970449b49aefdbc255ebb55e9cbcdd2a9abf9
SHA3-384 hash: cdaefe311bf39d81e1b2eefdb20d1ca20e42839c879ca22edf2b4209159746496015cb0ba1d7c09029662a218ac93178
SHA1 hash: 2ff6bb0a50b3bf3540e5d2c27910d464d4eff5c3
MD5 hash: 83680d723032ba773e6be1f5f8ce3beb
humanhash: ack-high-yellow-moon
File name:83680d723032ba773e6be1f5f8ce3beb
Download: download sample
Signature Moobot
File size:49'092 bytes
First seen:2024-02-23 10:13:48 UTC
Last seen:Never
File type: elf
MIME type:application/x-executable
ssdeep 768:NfePldw81eJ3RUF2bEbxQRHdiKLxzyLcuF838zcP8THi5OzypEkDl+JY:tullkRO2bQx2lLlyLVF8381C5OzQEkWY
TLSH T181233AD6B800AF7CF98BE7BF80570909F621731551930B2667B7FD836C321A85D66D82
Reporter zbetcheckin
Tags:32 elf mirai Moobot motorola

Intelligence


File Origin
# of uploads :
1
# of downloads :
92
Origin country :
FR FR
Vendor Threat Intelligence
Verdict:
Unknown
Threat level:
  0/10
Confidence:
100%
Tags:
anti-debug
Result
Verdict:
MALICIOUS
Result
Threat name:
Detection:
malicious
Classification:
troj
Score:
64 / 100
Signature
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic
Yara detected Moobot
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1397558 Sample: pm71xWvAqP.elf Startdate: 23/02/2024 Architecture: LINUX Score: 64 20 98.22.144.215 WINDSTREAMUS United States 2->20 22 109.104.184.98 WILDPARK-ASISPWildParkUkraineNikolaevUA Ukraine 2->22 24 99 other IPs or domains 2->24 26 Snort IDS alert for network traffic 2->26 28 Multi AV Scanner detection for submitted file 2->28 30 Yara detected Moobot 2->30 8 pm71xWvAqP.elf 2->8         started        10 dash head 2->10         started        12 dash cat 2->12         started        14 7 other processes 2->14 signatures3 process4 process5 16 pm71xWvAqP.elf 8->16         started        process6 18 pm71xWvAqP.elf 16->18         started       
Threat name:
Linux.Trojan.Mirai
Status:
Malicious
First seen:
2024-02-23 10:14:06 UTC
File Type:
ELF32 Big (Exe)
AV detection:
17 of 24 (70.83%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:mirai linux
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Moobot

elf c1d70983fbdfe65ec68a3813f7f970449b49aefdbc255ebb55e9cbcdd2a9abf9

(this sample)

  
Delivery method
Distributed via web download

Comments



Avatar
zbet commented on 2024-02-23 10:13:49 UTC

url : hxxp://5.181.80.126/VB4DC.m68k