MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 cedaeac298902741dd692815262eca26d724d81c68d6c00cfbe9e1fbad49f4fe. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 10


Intelligence 10 IOCs YARA 7 File information Comments

SHA256 hash: cedaeac298902741dd692815262eca26d724d81c68d6c00cfbe9e1fbad49f4fe
SHA3-384 hash: 13ee593090232a41083b2e265d79729b39dd01be88828829ee41a7fa98bc4c137dc3bb0a5da0484e5c2fdf8ca7cf8d68
SHA1 hash: b50e4b08bcee0955955145ae595bde714b12ea05
MD5 hash: e640c22898d899b5504f10444d3cfd30
humanhash: gee-july-finch-undress
File name:x86_64
Download: download sample
Signature Mirai
File size:98'104 bytes
First seen:2025-06-23 06:42:32 UTC
Last seen:Never
File type: elf
MIME type:application/x-executable
ssdeep 1536:mJhlIQkPUdTyRwpnl6p6eGpjH+HEsyJyZbq2x/XjqGZhXJMi8zcC3r8Pq16wI99:KKJUC8pjnVJyI2VeGZrcccr9BI
TLSH T1B4A32803F9C168FCC08AC2315F6FA236F636F56C1331769F5785EA312D6AE20DA59690
telfhash t1a72149702ed635d871ebcbb9731ad1f2d8320c3299d075b5aa3b5ee18e53f840d82491
TrID 50.1% (.) ELF Executable and Linkable format (Linux) (4022/12)
49.8% (.O) ELF Executable and Linkable format (generic) (4000/1)
Magika elf
Reporter abuse_ch
Tags:elf mirai

Intelligence


File Origin
# of uploads :
1
# of downloads :
80
Origin country :
DE DE
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Kills processes
Creating a file
Connection attempt
Receives data from a server
Sends data to a server
DNS request
Runs as daemon
Kills critical processes
Substitutes an application name
Verdict:
Malicious
Uses P2P?:
false
Uses anti-vm?:
true
Architecture:
x86
Packer:
not packed
Botnet:
unknown
Number of open files:
113
Number of processes launched:
4
Processes remaning?
true
Remote TCP ports scanned:
not identified
Behaviour
Anti-VM
Process Renaming
Botnet C2s
TCP botnet C2(s):
not identified
UDP botnet C2(s):
type: 74.125.250.129:19302
Status:
terminated
Behavior Graph:
%3 guuid=27b2c172-1a00-0000-d4e9-e333b40b0000 pid=2996 /usr/bin/sudo guuid=4011a774-1a00-0000-d4e9-e333ba0b0000 pid=3002 /tmp/sample.bin guuid=27b2c172-1a00-0000-d4e9-e333b40b0000 pid=2996->guuid=4011a774-1a00-0000-d4e9-e333ba0b0000 pid=3002 execve guuid=56f41f75-1a00-0000-d4e9-e333bb0b0000 pid=3003 /tmp/telnetd zombie guuid=4011a774-1a00-0000-d4e9-e333ba0b0000 pid=3002->guuid=56f41f75-1a00-0000-d4e9-e333bb0b0000 pid=3003 clone guuid=e0654375-1a00-0000-d4e9-e333bc0b0000 pid=3004 /tmp/telnetd dns net send-data guuid=56f41f75-1a00-0000-d4e9-e333bb0b0000 pid=3003->guuid=e0654375-1a00-0000-d4e9-e333bc0b0000 pid=3004 clone 8b0a01dc-0728-52c1-8024-c4ba7801b8d6 8.8.8.8:53 guuid=e0654375-1a00-0000-d4e9-e333bc0b0000 pid=3004->8b0a01dc-0728-52c1-8024-c4ba7801b8d6 send: 88B 9d2e4abb-d8f9-5c89-99ed-6afa8f90cf5c 152.42.224.225:9035 guuid=e0654375-1a00-0000-d4e9-e333bc0b0000 pid=3004->9d2e4abb-d8f9-5c89-99ed-6afa8f90cf5c send: 728B 7f30281f-6565-565b-903e-76ab0b9d4286 stun.l.google.com:19302 guuid=e0654375-1a00-0000-d4e9-e333bc0b0000 pid=3004->7f30281f-6565-565b-903e-76ab0b9d4286 send: 20B c5c5c5d6-1993-55be-9176-de86cceb17e3 152.42.224.225:9000 guuid=e0654375-1a00-0000-d4e9-e333bc0b0000 pid=3004->c5c5c5d6-1993-55be-9176-de86cceb17e3 send: 32B guuid=62d82fc7-1a00-0000-d4e9-e333560c0000 pid=3158 /tmp/telnetd dns net send-data guuid=e0654375-1a00-0000-d4e9-e333bc0b0000 pid=3004->guuid=62d82fc7-1a00-0000-d4e9-e333560c0000 pid=3158 clone guuid=62d82fc7-1a00-0000-d4e9-e333560c0000 pid=3158->8b0a01dc-0728-52c1-8024-c4ba7801b8d6 send: 520B a4109754-3997-5f42-83f5-f487770de60e dualstack.zd.map.fastly.net:80 guuid=62d82fc7-1a00-0000-d4e9-e333560c0000 pid=3158->a4109754-3997-5f42-83f5-f487770de60e send: 115B 464a049a-1462-5e70-82e5-e82c0c936861 dus.speedtest.komdsl.de:8080 guuid=62d82fc7-1a00-0000-d4e9-e333560c0000 pid=3158->464a049a-1462-5e70-82e5-e82c0c936861 send: 88707355B 0814c69e-7131-5058-9868-a2aca08d54ba dus.speedtest.contabo.net:8080 guuid=62d82fc7-1a00-0000-d4e9-e333560c0000 pid=3158->0814c69e-7131-5058-9868-a2aca08d54ba send: 118B 356734c6-dbe0-54ca-9245-7cbb0d3c962c speed.de-west-02.wiit-cloud.io:8080 guuid=62d82fc7-1a00-0000-d4e9-e333560c0000 pid=3158->356734c6-dbe0-54ca-9245-7cbb0d3c962c send: 123B 29e1f18e-68cc-5938-855a-46fb919e062f speedtest.4qh.de:8080 guuid=62d82fc7-1a00-0000-d4e9-e333560c0000 pid=3158->29e1f18e-68cc-5938-855a-46fb919e062f send: 109B dbaf1728-e66d-59ed-aa3f-74bef98e2076 ookla.prod.services.dg-sys.net:8080 guuid=62d82fc7-1a00-0000-d4e9-e333560c0000 pid=3158->dbaf1728-e66d-59ed-aa3f-74bef98e2076 send: 113B 80b46101-7099-5c85-a2dc-644bdcdb628e speedtest.agw1.as49436.net:8080 guuid=62d82fc7-1a00-0000-d4e9-e333560c0000 pid=3158->80b46101-7099-5c85-a2dc-644bdcdb628e send: 119B ece7dee1-c772-5b7f-933d-8eeef2534107 speedtest.agw2.as49436.net:8080 guuid=62d82fc7-1a00-0000-d4e9-e333560c0000 pid=3158->ece7dee1-c772-5b7f-933d-8eeef2534107 send: 119B 28e57f88-9129-5714-b616-4400ebc132d1 speedtest.stellar-synergy.de:8080 guuid=62d82fc7-1a00-0000-d4e9-e333560c0000 pid=3158->28e57f88-9129-5714-b616-4400ebc132d1 send: 121B efb22362-5fa6-51e4-9271-faf1e07aeb69 speedtest.desloovere-ict.be:8080 guuid=62d82fc7-1a00-0000-d4e9-e333560c0000 pid=3158->efb22362-5fa6-51e4-9271-faf1e07aeb69 send: 120B d9b04a66-893f-5fa8-ab83-b6806718aab2 speedtest.stw-bonn.de:8080 guuid=62d82fc7-1a00-0000-d4e9-e333560c0000 pid=3158->d9b04a66-893f-5fa8-ab83-b6806718aab2 send: 114B
Result
Threat name:
n/a
Detection:
malicious
Classification:
spyw
Score:
60 / 100
Signature
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Opens /sys/class/net/* files useful for querying network interface information
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1720671 Sample: x86_64.elf Startdate: 23/06/2025 Architecture: LINUX Score: 60 25 Malicious sample detected (through community Yara rule) 2->25 27 Multi AV Scanner detection for submitted file 2->27 8 x86_64.elf 2->8         started        10 dash rm 2->10         started        12 dash rm 2->12         started        process3 process4 14 x86_64.elf 8->14         started        signatures5 29 Opens /sys/class/net/* files useful for querying network interface information 14->29 17 x86_64.elf 14->17         started        process6 process7 19 x86_64.elf 17->19         started        21 x86_64.elf 17->21         started        23 x86_64.elf 17->23         started       
Threat name:
Linux.Worm.Mirai
Status:
Malicious
First seen:
2025-06-23 06:43:35 UTC
File Type:
ELF64 Little (Exe)
AV detection:
18 of 24 (75.00%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
credential_access defense_evasion discovery linux
Behaviour
Enumerates kernel/hardware configuration
Reads runtime system information
Changes its process name
Reads process memory
Enumerates running processes
Reads MAC address of network interface
Reads network interface configuration
Renames itself
Verdict:
Malicious
Tags:
trojan gafgyt
YARA:
Linux_Trojan_Gafgyt_9e9530a7 Linux_Trojan_Gafgyt_d4227dbf Linux_Trojan_Gafgyt_d996d335 Linux_Trojan_Gafgyt_620087b9 Linux_Trojan_Gafgyt_33b4111a
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:linux_generic_ipv6_catcher
Author:@_lubiedo
Description:ELF samples using IPv6 addresses
Rule name:Linux_Trojan_Gafgyt_33b4111a
Author:Elastic Security
Rule name:Linux_Trojan_Gafgyt_620087b9
Author:Elastic Security
Rule name:Linux_Trojan_Gafgyt_9e9530a7
Author:Elastic Security
Rule name:Linux_Trojan_Gafgyt_d4227dbf
Author:Elastic Security
Rule name:Linux_Trojan_Gafgyt_d996d335
Author:Elastic Security
Rule name:unixredflags3
Author:Tim Brown @timb_machine
Description:Hunts for UNIX red flags

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

elf cedaeac298902741dd692815262eca26d724d81c68d6c00cfbe9e1fbad49f4fe

(this sample)

  
Delivery method
Distributed via web download

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_PIEMissing Position-Independent Executable (PIE) Protectionhigh

Comments