MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 d7db620e7b6f8b4a7a594adab25db9208f193e4f7bdab424322db604d9ac01a6. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 10


Intelligence 10 IOCs YARA File information Comments 1

SHA256 hash: d7db620e7b6f8b4a7a594adab25db9208f193e4f7bdab424322db604d9ac01a6
SHA3-384 hash: 6fbc64fcd3c86a07c2287c31e3de3b538278888e084261698de741a9672bc8724c447248b75f886a644cb67e5cb60f02
SHA1 hash: 6e97933d013ea962c00164a55361cf4ff007bb8b
MD5 hash: 3c24a7b77bc414557ede16b5eb7d1987
humanhash: quebec-sierra-summer-magazine
File name:3c24a7b77bc414557ede16b5eb7d1987
Download: download sample
Signature Mirai
File size:50'876 bytes
First seen:2024-02-23 10:13:37 UTC
Last seen:Never
File type: elf
MIME type:application/x-executable
ssdeep 768:r6fsJDUlBf5odAiUapEv3TsIbOkdnoJ+cOezgNveC1wbfKKNOFp4oL+:ss16N5kUayv3TsIbxdJFetYC
TLSH T152332881BCC18A16C9D413BBFA2E418D372663A8E1DF32079D216F117BDA82F0D7B641
telfhash t11201b142da8c1e4c65e8400d8119770fd6d872d5165f7d424ed9ee8fbe0adf0b491073
TrID 50.1% (.) ELF Executable and Linkable format (Linux) (4022/12)
49.8% (.O) ELF Executable and Linkable format (generic) (4000/1)
Reporter zbetcheckin
Tags:32 arm elf mirai

Intelligence


File Origin
# of uploads :
1
# of downloads :
96
Origin country :
FR FR
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:
Verdict:
Unknown
Threat level:
  0/10
Confidence:
100%
Tags:
anti-debug
Verdict:
Malicious
Uses P2P?:
false
Uses anti-vm?:
false
Architecture:
arm
Packer:
not packed
Botnet:
unknown
Number of open files:
0
Number of processes launched:
2
Processes remaning?
true
Remote TCP ports scanned:
9530
Behaviour
Process Renaming
Botnet C2s
TCP botnet C2(s):
not identified
UDP botnet C2(s):
not identified
Result
Verdict:
MALICIOUS
Result
Threat name:
Detection:
malicious
Classification:
troj
Score:
64 / 100
Signature
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic
Yara detected Moobot
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1397561 Sample: tOmZunyvIE.elf Startdate: 23/02/2024 Architecture: LINUX Score: 64 16 197.214.155.193 airtelcgCG Congo 2->16 18 115.65.96.96 XEPHIONNTT-MECorporationJP Japan 2->18 20 99 other IPs or domains 2->20 22 Snort IDS alert for network traffic 2->22 24 Multi AV Scanner detection for submitted file 2->24 26 Yara detected Moobot 2->26 8 tOmZunyvIE.elf 2->8         started        10 dash rm 2->10         started        signatures3 process4 process5 12 tOmZunyvIE.elf 8->12         started        process6 14 tOmZunyvIE.elf 12->14         started       
Threat name:
Linux.Trojan.Mirai
Status:
Malicious
First seen:
2024-02-23 10:14:05 UTC
File Type:
ELF32 Little (Exe)
AV detection:
18 of 24 (75.00%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:mirai
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

elf d7db620e7b6f8b4a7a594adab25db9208f193e4f7bdab424322db604d9ac01a6

(this sample)

  
Delivery method
Distributed via web download

Comments



Avatar
zbet commented on 2024-02-23 10:13:38 UTC

url : hxxp://5.181.80.126/VB4DC.arm5