MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 d1fd9402f6466b9f9b4524cfe3ba1256fb5fa55e827aabc223b326888220bf93. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: d1fd9402f6466b9f9b4524cfe3ba1256fb5fa55e827aabc223b326888220bf93
SHA3-384 hash: 24848ac34020b1bcbabb4416fda5a21009cd693b90bb71d26bb5b69ecd0364314f84c105ddfeb550683184816e44a5e9
SHA1 hash: 756a362b8f9522e0cabd3b28afd4a93e910e74f3
MD5 hash: 219af2a341c8399f631668dc272c75d1
humanhash: zebra-cola-solar-pizza
File name:dlr.arm5
Download: download sample
Signature Mirai
File size:1'776 bytes
First seen:2025-12-06 07:28:43 UTC
Last seen:2025-12-06 09:24:12 UTC
File type: elf
MIME type:application/x-executable
ssdeep 48:7GJZo/6DIzagCpFaFaX8S0OLBmtBa4eX:7Qo9WFaFWAOLEtBatX
TLSH T1BF3100D4AAE05E6DD9D182FF8C5D03587352DF4AE2D77612A20CB3689D1EA5CCD1B00B
telfhash t120a002758b8fb7ecf6760e8c08e902446655e15f58509461c9f51d858587a40b595620
TrID 50.1% (.) ELF Executable and Linkable format (Linux) (4022/12)
49.8% (.O) ELF Executable and Linkable format (generic) (4000/1)
Magika elf
Reporter abuse_ch
Tags:elf mirai

Intelligence


File Origin
# of uploads :
3
# of downloads :
37
Origin country :
DE DE
Vendor Threat Intelligence
No detections
Verdict:
Malicious
File Type:
elf.32.le
First seen:
2025-12-06T06:30:00Z UTC
Last seen:
2025-12-07T06:18:00Z UTC
Hits:
~10
Result
Threat name:
n/a
Detection:
malicious
Classification:
n/a
Score:
48 / 100
Signature
Multi AV Scanner detection for submitted file
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1827861 Sample: dlr.arm5.elf Startdate: 06/12/2025 Architecture: LINUX Score: 48 31 169.254.169.254, 80 USDOSUS Reserved 2->31 33 perferctdmng.is 179.43.172.109, 2113, 34684, 49928 PLI-ASCH Panama 2->33 35 daisy.ubuntu.com 2->35 37 Multi AV Scanner detection for submitted file 2->37 8 dlr.arm5.elf Hari 2->8         started        11 python3.8 dpkg 2->11         started        13 bash ld-linux-x86-64.so.2 2->13         started        signatures3 process4 file5 29 /tmp/Hari, ELF 8->29 dropped 15 Hari 8->15         started        17 Hari 8->17         started        19 Hari 8->19         started        process6 process7 21 Hari iptables 15->21         started        23 Hari iptables 15->23         started        25 Hari iptables 15->25         started        27 30 other processes 15->27
Threat name:
Linux.Worm.Mirai
Status:
Malicious
First seen:
2025-12-06 07:15:50 UTC
File Type:
ELF32 Little (Exe)
AV detection:
18 of 37 (48.65%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Writes file to tmp directory
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

elf d1fd9402f6466b9f9b4524cfe3ba1256fb5fa55e827aabc223b326888220bf93

(this sample)

  
Delivery method
Distributed via web download

Comments