MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 d338b0011185b160a6b2bae57697b228a5b0a05e7912efc109d4bc914275615d. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: d338b0011185b160a6b2bae57697b228a5b0a05e7912efc109d4bc914275615d
SHA3-384 hash: 2c0f29b27dc6bfd256cf2a74472a06e59efaa50a838e017a421a49baddc2f0bdb7759ffe3673d000c765e7d0779d9625
SHA1 hash: d715a74921122af9b91df037dc784d1a4b1bf894
MD5 hash: a9113799fc28ab447e8ba16c1b8f736f
humanhash: carbon-december-pennsylvania-xray
File name:dlr.arm5
Download: download sample
Signature Mirai
File size:1'144 bytes
First seen:2025-02-10 18:46:27 UTC
Last seen:2025-02-10 20:15:19 UTC
File type: elf
MIME type:application/x-executable
ssdeep 24:wj4llMJWqY3D5KjEoKGDNrUlFSs0VzLCkId02HSOIGGgNf+3:L//N3DMLNrkFSsCzLRe/IGBNW
TLSH T1E321CB6A97D3AD17CC540233DCEB7720E321BA45C58EF513E30252110C3F2164F21345
telfhash t180900224864f44909a901785d08976018ec0d3231115289006d0984014437106015141
TrID 50.1% (.) ELF Executable and Linkable format (Linux) (4022/12)
49.8% (.O) ELF Executable and Linkable format (generic) (4000/1)
Magika elf
Reporter abuse_ch
Tags:elf mirai

Intelligence


File Origin
# of uploads :
2
# of downloads :
80
Origin country :
DE DE
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:
Verdict:
Malicious
Uses P2P?:
false
Uses anti-vm?:
false
Architecture:
arm
Packer:
not packed
Botnet:
unknown
Number of open files:
0
Number of processes launched:
0
Processes remaning?
false
Remote TCP ports scanned:
not identified
Behaviour
no suspicious findings
Botnet C2s
TCP botnet C2(s):
not identified
UDP botnet C2(s):
not identified
Result
Verdict:
UNKNOWN
Result
Threat name:
n/a
Detection:
malicious
Classification:
n/a
Score:
48 / 100
Signature
Multi AV Scanner detection for submitted file
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1611331 Sample: dlr.arm5.elf Startdate: 10/02/2025 Architecture: LINUX Score: 48 12 109.202.202.202, 80 INIT7CH Switzerland 2->12 14 91.189.91.42, 443 CANONICAL-ASGB United Kingdom 2->14 16 2 other IPs or domains 2->16 18 Multi AV Scanner detection for submitted file 2->18 6 dash rm 2->6         started        8 dash rm 2->8         started        10 dlr.arm5.elf 2->10         started        signatures3 process4
Threat name:
Linux.Downloader.Mirai
Status:
Malicious
First seen:
2025-02-10 18:47:13 UTC
File Type:
ELF32 Little (Exe)
AV detection:
11 of 38 (28.95%)
Threat level:
  3/5
Result
Malware family:
n/a
Score:
  1/10
Tags:
n/a
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

elf d338b0011185b160a6b2bae57697b228a5b0a05e7912efc109d4bc914275615d

(this sample)

  
Delivery method
Distributed via web download

Comments