MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 cc9f1a2cdc53de1e6a057ef957ebefb5ef8e4a2e2e95c888ad1d0f0e297bdcb9. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 10


Intelligence 10 IOCs YARA File information Comments

SHA256 hash: cc9f1a2cdc53de1e6a057ef957ebefb5ef8e4a2e2e95c888ad1d0f0e297bdcb9
SHA3-384 hash: a8c802d1a40291e9ea73999f862a80b80e5dc5cc0fb6b6150e458ee892c570fc712ce72c2bf48e85a52a2039527a0133
SHA1 hash: 1c3b75ff7c5cdd2e040fbdd261b74fa6f48d9d69
MD5 hash: ca533f0a04c27d1db06866c68f14bbde
humanhash: colorado-autumn-zebra-massachusetts
File name:res.sh4
Download: download sample
Signature Mirai
File size:33'780 bytes
First seen:2025-01-12 14:34:06 UTC
Last seen:2025-01-13 01:05:14 UTC
File type: elf
MIME type:application/x-executable
ssdeep 768:JPUcQAzWzrg+QuYMm3q0R3ATonKv8Y9mbbCt+:ZDQWirhQ7qFknKv8YybCt+
TLSH T146E27C62CD3E2DA4E2084A74F9348BFC9F13F445A36B0EE5952A96768017DCCFC192B4
TrID 50.1% (.) ELF Executable and Linkable format (Linux) (4022/12)
49.8% (.O) ELF Executable and Linkable format (generic) (4000/1)
Magika elf
Reporter abuse_ch
Tags:elf mirai

Intelligence


File Origin
# of uploads :
2
# of downloads :
102
Origin country :
DE DE
Vendor Threat Intelligence
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
android anti-debug masquerade mirai packed
Result
Verdict:
MALICIOUS
Result
Threat name:
n/a
Detection:
malicious
Classification:
spre
Score:
52 / 100
Signature
Multi AV Scanner detection for submitted file
Sample tries to kill multiple processes (SIGKILL)
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1589475 Sample: res.sh4.elf Startdate: 12/01/2025 Architecture: LINUX Score: 52 25 102.87.46.202 ZAINUGASUG Uganda 2->25 27 204.73.141.78 VOYANTUS United States 2->27 29 98 other IPs or domains 2->29 33 Multi AV Scanner detection for submitted file 2->33 8 res.sh4.elf 2->8         started        10 gnome-session-binary sh gsd-print-notifications 2->10         started        12 xfce4-session rm 2->12         started        signatures3 process4 process5 14 res.sh4.elf 8->14         started        16 gsd-print-notifications 10->16         started        process6 18 res.sh4.elf 14->18         started        21 res.sh4.elf 14->21         started        23 gsd-print-notifications gsd-printer 16->23         started        signatures7 31 Sample tries to kill multiple processes (SIGKILL) 18->31
Threat name:
Linux.Trojan.Mirai
Status:
Malicious
First seen:
2025-01-12 03:01:39 UTC
File Type:
ELF32 Little (Exe)
AV detection:
15 of 24 (62.50%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  1/10
Tags:
linux
Verdict:
Malicious
Tags:
Unix.Dropper.Mirai-7136288-0
YARA:
n/a
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

elf cc9f1a2cdc53de1e6a057ef957ebefb5ef8e4a2e2e95c888ad1d0f0e297bdcb9

(this sample)

  
Delivery method
Distributed via web download

Comments