MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 d90b52ec4e5b30831b620106061664f9adeb84a773115376384baa49c8027c9b. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 7


Intelligence 7 IOCs YARA 6 File information Comments

SHA256 hash: d90b52ec4e5b30831b620106061664f9adeb84a773115376384baa49c8027c9b
SHA3-384 hash: bbd204051149fd96105cdfc7d0885f51891cb6885961dabcea086b5895b029dd894b91c3861a96af6ad4a91be6bdd82c
SHA1 hash: 0bdfd1f325981f817d99203be4fae7a90aa18376
MD5 hash: b54cfcc5944dc4c5a8a6778bfe85f962
humanhash: skylark-whiskey-carpet-rugby
File name:armv7l
Download: download sample
Signature Mirai
File size:108'512 bytes
First seen:2026-01-04 09:10:10 UTC
Last seen:2026-01-05 21:30:17 UTC
File type: elf
MIME type:application/x-executable
ssdeep 3072:/8LtijfmFeAacV5HV3iXyYE/bAwTWYKK4r:/WtirYeAacV5HV3oyHb7TWE4r
TLSH T12AB3F656AA829F01D4D731BAFB9E815833536FB9D3FA3101DD20AF6023CA5DB0F66116
telfhash t192f08b62051829cd33e9472246de7b71ab01e0776f263837be9d8f465323497b003518
Magika elf
Reporter abuse_ch
Tags:elf mirai

Intelligence


File Origin
# of uploads :
5
# of downloads :
43
Origin country :
DE DE
Vendor Threat Intelligence
No detections
Result
Verdict:
Malware
Maliciousness:

Behaviour
Runs as daemon
Kills processes
Opens a port
Changes access rights for a written file
Launching a process
Sends data to a server
Sets a written file as executable
Creating a file
Collects information on the CPU
Changes the time when the file was created, accessed, or modified
Connection attempt
Kills critical processes
Writes files to system directory
Substitutes an application name
Creates or modifies files in /cron to set up autorun
Creates or modifies files in /init.d to set up autorun
Verdict:
Unknown
File Type:
elf.32.le
First seen:
2026-01-03T22:15:00Z UTC
Last seen:
2026-01-04T06:47:00Z UTC
Hits:
~10
Result
Threat name:
Detection:
malicious
Classification:
spre.troj.evad.mine
Score:
84 / 100
Signature
Drops files in suspicious directories
Executes the "crontab" command typically for achieving persistence
Found strings related to Crypto-Mining
Multi AV Scanner detection for submitted file
Sample tries to kill multiple processes (SIGKILL)
Sample tries to persist itself using cron
Sample tries to persist itself using System V runlevels
Sample tries to set files in /etc globally writable
Yara detected Mirai
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1844398 Sample: armv7l.elf Startdate: 04/01/2026 Architecture: LINUX Score: 84 71 45.153.34.74, 12344, 45324 SKYLINKNL Germany 2->71 73 34.243.160.129, 443 AMAZON-02US United States 2->73 75 54.171.230.55, 443, 60070 AMAZON-02US United States 2->75 81 Multi AV Scanner detection for submitted file 2->81 83 Yara detected Mirai 2->83 9 armv7l.elf 2->9         started        12 dash rm 2->12         started        14 dash grep 2->14         started        16 dash rm 2->16         started        signatures3 process4 signatures5 93 Found strings related to Crypto-Mining 9->93 18 armv7l.elf 9->18         started        20 armv7l.elf sh 9->20         started        22 armv7l.elf sh 9->22         started        24 3 other processes 9->24 process6 file7 28 armv7l.elf sh 18->28         started        30 armv7l.elf sh 18->30         started        32 armv7l.elf sh 18->32         started        44 41 other processes 18->44 34 sh crontab 20->34         started        38 sh 20->38         started        40 sh cp 22->40         started        42 sh chmod 22->42         started        69 /etc/rc.local, ASCII 24->69 dropped 95 Sample tries to persist itself using System V runlevels 24->95 46 2 other processes 24->46 signatures8 process9 file10 48 sh pkill 28->48         started        51 sh pkill 30->51         started        53 sh pkill 32->53         started        65 /var/spool/cron/crontabs/tmp.13IycT, ASCII 34->65 dropped 85 Sample tries to persist itself using cron 34->85 87 Executes the "crontab" command typically for achieving persistence 34->87 55 sh crontab 38->55         started        67 /usr/bin/systemd-update, ELF 40->67 dropped 89 Drops files in suspicious directories 40->89 57 sh crontab 44->57         started        59 sh pkill 44->59         started        61 sh pkill 44->61         started        63 39 other processes 44->63 91 Sample tries to set files in /etc globally writable 46->91 signatures11 process12 signatures13 77 Sample tries to kill multiple processes (SIGKILL) 48->77 79 Executes the "crontab" command typically for achieving persistence 55->79
Threat name:
Linux.Worm.Mirai
Status:
Malicious
First seen:
2026-01-04 06:18:22 UTC
File Type:
ELF32 Little (Exe)
AV detection:
8 of 24 (33.33%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
defense_evasion discovery execution persistence privilege_escalation
Behaviour
Command and Scripting Interpreter: Unix Shell
Reads runtime system information
Writes file to tmp directory
Changes its process name
Creates/modifies Cron job
Enumerates running processes
Modifies rc script
Modifies systemd
Write file to user bin folder
File and Directory Permissions Modification
Modifies hosts file
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:ELF_Mirai
Author:NDA0E
Description:Detects multiple Mirai variants
Rule name:ELF_Toriilike_persist
Author:4r4
Description:Detects Torii IoT Botnet (stealthier Mirai alternative)
Reference:Identified via researched data
Rule name:enterpriseapps2
Author:Tim Brown @timb_machine
Description:Enterprise apps
Rule name:linux_generic_ipv6_catcher
Author:@_lubiedo
Description:ELF samples using IPv6 addresses
Rule name:Linux_Generic_Threat_8299c877
Author:Elastic Security
Rule name:unixredflags3
Author:Tim Brown @timb_machine
Description:Hunts for UNIX red flags

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

elf d90b52ec4e5b30831b620106061664f9adeb84a773115376384baa49c8027c9b

(this sample)

  
Delivery method
Distributed via web download

Comments