MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 d546509ab6670f9ff31783ed72875dfc0f37fa2b666bd5870eecaaed2ebea4a8. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 3


Intelligence 3 IOCs YARA File information Comments

SHA256 hash: d546509ab6670f9ff31783ed72875dfc0f37fa2b666bd5870eecaaed2ebea4a8
SHA3-384 hash: 03cc45941dfbc246cb203ce4c6fca8906a51c3f8e3a977fbdc8ce1ac0462f3ce5d18779b636c7ada5b3b42a5c68ebd4a
SHA1 hash: 2327be693bc11a618c380d7d3abc2382d870d48b
MD5 hash: 4dde761681684d7edad4e5e1ffdb940b
humanhash: blue-thirteen-queen-echo
File name:d546509ab6670f9ff31783ed72875dfc0f37fa2b666bd5870eecaaed2ebea4a8
Download: download sample
Signature Mirai
File size:108'808 bytes
First seen:2020-03-23 17:28:25 UTC
Last seen:2025-10-28 23:12:55 UTC
File type: elf
MIME type:application/x-executable
ssdeep 1536:3aQiZDMyqIlMBZ/R0F4E4kcHiNq98wk9njKZjjLuYo68864sNHFEzv7Ld76divkE:KzDMyqIMBZ/R0ufhBmgZy9yNsNmPtcE
TLSH 96B312A3FB6DCA9FE8611F74DEFC367BBF1978E9C80871C1C5641E265091124A324B86
Reporter Marco_Ramilli
Tags:gafgyt

Intelligence


File Origin
# of uploads :
40
# of downloads :
275
Origin country :
DE DE
Vendor Threat Intelligence
Result
Threat name:
Detection:
malicious
Classification:
spre.troj.evad
Score:
100 / 100
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 235158 Sample: Mozi.a Startdate: 03/06/2020 Architecture: LINUX Score: 100 83 144.124.184.49, 52869 JANETJiscServicesLimitedGB United Kingdom 2->83 85 34.24.160.243, 37215 ATGS-MMD-AS-ATTGlobalNetworkServicesLLCUS United States 2->85 87 98 other IPs or domains 2->87 97 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->97 99 Antivirus detection for dropped file 2->99 101 Antivirus / Scanner detection for submitted sample 2->101 103 5 other signatures 2->103 11 Mozi.a 2->11         started        13 upstart sh 2->13         started        15 upstart sh 2->15         started        17 upstart sh 2->17         started        signatures3 process4 process5 19 Mozi.a 11->19         started        21 sh date 13->21         started        23 sh apport-checkreports 13->23         started        25 sh date 15->25         started        27 sh apport-gtk 15->27         started        29 sh date 17->29         started        31 sh apport-gtk 17->31         started        process6 33 Mozi.a 19->33         started        file7 75 /usr/networks, ELF 33->75 dropped 77 /etc/rcS.d/S95baby.sh, POSIX 33->77 dropped 79 /etc/rc.local, ASCII 33->79 dropped 81 19 other malicious files 33->81 dropped 91 Sample tries to persist itself using /etc/profile 33->91 93 Drops files in suspicious directories 33->93 95 Sample tries to persist itself using System V runlevels 33->95 37 Mozi.a 33->37         started        39 Mozi.a sh 33->39         started        41 Mozi.a sh 33->41         started        43 11 other processes 33->43 signatures8 process9 process10 45 Mozi.a sh 37->45         started        47 Mozi.a sh 37->47         started        49 Mozi.a sh 37->49         started        51 Mozi.a sh 37->51         started        53 sh iptables 39->53         started        56 sh iptables 41->56         started        58 sh iptables 43->58         started        60 sh iptables 43->60         started        62 4 other processes 43->62 signatures11 64 sh iptables 45->64         started        67 sh iptables 47->67         started        69 sh iptables 49->69         started        71 sh iptables 51->71         started        105 Executes the "iptables" command to insert, remove and/or manipulate rules 53->105 73 iptables modprobe 53->73         started        process12 signatures13 89 Executes the "iptables" command to insert, remove and/or manipulate rules 64->89
Gathering data
Threat name:
Linux.Trojan.Gafgyt
Status:
Malicious
First seen:
2019-11-28 05:11:42 UTC
AV detection:
17 of 31 (54.84%)
Threat level:
  2/5
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

elf d546509ab6670f9ff31783ed72875dfc0f37fa2b666bd5870eecaaed2ebea4a8

(this sample)

  
Delivery method
Distributed via web download

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_NXMissing Non-Executable Memory Protectioncritical
CHECK_PIEMissing Position-Independent Executable (PIE) Protectionhigh

Comments