MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 d10f5fd9a2eeee7627a8e082e1c03211d5333bcf7e6b457ca2a78816c4bfbdec. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 8


Intelligence 8 IOCs YARA 3 File information Comments

SHA256 hash: d10f5fd9a2eeee7627a8e082e1c03211d5333bcf7e6b457ca2a78816c4bfbdec
SHA3-384 hash: 6a90a7137bebc89a0599fa9edf2b65a3bf8606c01cfe860a23ac4cbfb3482c8f61ee2af709aa2d07aae14d76e295a8a3
SHA1 hash: e1c5c9f8f656ee3d53727f281ede0c7399efbb1f
MD5 hash: 5481b87eb5a16edd3f5d095cfa1eba55
humanhash: mirror-violet-emma-pluto
File name:xnxnxnxnxnxnxnxni586xnxn
Download: download sample
Signature Mirai
File size:49'580 bytes
First seen:2025-10-18 16:51:17 UTC
Last seen:Never
File type: elf
MIME type:application/x-executable
ssdeep 1536:SdaqAZoVUvWU+rrluDT6iw3RX6HLkg4azHc5F:SUZeWvWUiKhQ6LGazHw
TLSH T13123014A12D05755D3A322B1A1FEF4AF829EC009807BA548F2B63699EEE47354B1F870
telfhash t1f5b01251c12931fc4438f3019302c5730184cd040c30604c311d0e2042356f195140f0
TrID 50.1% (.) ELF Executable and Linkable format (Linux) (4022/12)
49.8% (.O) ELF Executable and Linkable format (generic) (4000/1)
Magika elf
Reporter abuse_ch
Tags:elf mirai

Intelligence


File Origin
# of uploads :
1
# of downloads :
57
Origin country :
DE DE
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Locks files
Creating a file in the %temp% directory
Kills processes
Runs as daemon
Creating a file
Connection attempt
Substitutes an application name
Verdict:
Unknown
Threat level:
  0/10
Confidence:
100%
Tags:
packed threat upx
Verdict:
Clean
File Type:
elf.32.le
First seen:
2025-10-18T14:46:00Z UTC
Last seen:
2025-10-18T14:59:00Z UTC
Hits:
~10
Status:
terminated
Behavior Graph:
%3 guuid=fbdb01fb-1700-0000-92ac-b3d6280e0000 pid=3624 /usr/bin/sudo guuid=6882e0fc-1700-0000-92ac-b3d62d0e0000 pid=3629 /tmp/sample.bin write-file guuid=fbdb01fb-1700-0000-92ac-b3d6280e0000 pid=3624->guuid=6882e0fc-1700-0000-92ac-b3d62d0e0000 pid=3629 execve guuid=fde296fd-1700-0000-92ac-b3d6300e0000 pid=3632 /tmp/sample.bin guuid=6882e0fc-1700-0000-92ac-b3d62d0e0000 pid=3629->guuid=fde296fd-1700-0000-92ac-b3d6300e0000 pid=3632 clone guuid=875da9fd-1700-0000-92ac-b3d6310e0000 pid=3633 /tmp/sample.bin dns net send-data zombie guuid=fde296fd-1700-0000-92ac-b3d6300e0000 pid=3632->guuid=875da9fd-1700-0000-92ac-b3d6310e0000 pid=3633 clone 4f6baed0-9587-596c-82b3-fd721afe4cc1 10.0.2.3:53 guuid=875da9fd-1700-0000-92ac-b3d6310e0000 pid=3633->4f6baed0-9587-596c-82b3-fd721afe4cc1 send: 29B 15fce85c-d36d-56f1-8e69-7bb633810194 upjohn90.cc:54128 guuid=875da9fd-1700-0000-92ac-b3d6310e0000 pid=3633->15fce85c-d36d-56f1-8e69-7bb633810194 send: 36B guuid=d3a5f402-1800-0000-92ac-b3d63e0e0000 pid=3646 /tmp/sample.bin zombie guuid=875da9fd-1700-0000-92ac-b3d6310e0000 pid=3633->guuid=d3a5f402-1800-0000-92ac-b3d63e0e0000 pid=3646 clone guuid=de02fe02-1800-0000-92ac-b3d63f0e0000 pid=3647 /tmp/sample.bin guuid=d3a5f402-1800-0000-92ac-b3d63e0e0000 pid=3646->guuid=de02fe02-1800-0000-92ac-b3d63f0e0000 pid=3647 clone guuid=38cc0a03-1800-0000-92ac-b3d6400e0000 pid=3648 /tmp/sample.bin guuid=d3a5f402-1800-0000-92ac-b3d63e0e0000 pid=3646->guuid=38cc0a03-1800-0000-92ac-b3d6400e0000 pid=3648 clone
Result
Threat name:
n/a
Detection:
malicious
Classification:
evad
Score:
52 / 100
Signature
Multi AV Scanner detection for submitted file
Sample is packed with UPX
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1797718 Sample: xnxnxnxnxnxnxnxni586xnxn.elf Startdate: 18/10/2025 Architecture: LINUX Score: 52 14 54.247.62.1, 43390, 443 AMAZON-02US United States 2->14 16 Multi AV Scanner detection for submitted file 2->16 18 Sample is packed with UPX 2->18 6 dash rm 2->6         started        8 dash cat 2->8         started        10 dash head 2->10         started        12 8 other processes 2->12 signatures3 process4
Threat name:
Linux.Backdoor.Mirai
Status:
Malicious
First seen:
2025-10-18 16:52:38 UTC
File Type:
ELF32 Little (Exe)
AV detection:
10 of 38 (26.32%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  6/10
Tags:
antivm discovery linux upx
Behaviour
Reads runtime system information
Writes file to tmp directory
Changes its process name
Reads system network configuration
Checks hardware identifiers (DMI)
Enumerates active TCP sockets
Enumerates running processes
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:linux_generic_ipv6_catcher
Author:@_lubiedo
Description:ELF samples using IPv6 addresses
Rule name:SUSP_ELF_LNX_UPX_Compressed_File
Author:Florian Roth (Nextron Systems)
Description:Detects a suspicious ELF binary with UPX compression
Reference:Internal Research
Rule name:upx_packed_elf_v1
Author:RandomMalware

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

elf d10f5fd9a2eeee7627a8e082e1c03211d5333bcf7e6b457ca2a78816c4bfbdec

(this sample)

  
Delivery method
Distributed via web download

Comments