MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 dc110aed2780301cabcc4e5d626023337129aefc21b8d0ef292d8f2a50c5d98e. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 9


Intelligence 9 IOCs YARA 6 File information Comments

SHA256 hash: dc110aed2780301cabcc4e5d626023337129aefc21b8d0ef292d8f2a50c5d98e
SHA3-384 hash: 78268428e1b989005603bb031b09fa03041af4ef8b26705790bd3d54a7098b0e1959f53036f817cb967163ac1cf2395a
SHA1 hash: b6abc75ef293bd2c0363339e38931b8513ba1c34
MD5 hash: c68e3567ba9c8e9fef3c8e844b8ea3e7
humanhash: october-iowa-paris-india
File name:aarch64
Download: download sample
Signature Mirai
File size:964'416 bytes
First seen:2025-05-20 17:47:44 UTC
Last seen:Never
File type: elf
MIME type:application/x-executable
ssdeep 24576:RHSJoHbloPpQfv/FjffFOVm+orbDtL8sqqr:QFyxjLtL8s
TLSH T180258DA9FF8D7E47C2C7D33A8E8B83302337E5A993068357B405522C9DC6A99DF91644
telfhash t186f0aca04a7d40800d62ed005c5211ff5edbd5661e82f945fb4addc52c6e01dfb43d4b
TrID 50.1% (.) ELF Executable and Linkable format (Linux) (4022/12)
49.8% (.O) ELF Executable and Linkable format (generic) (4000/1)
Magika elf
Reporter abuse_ch
Tags:elf mirai

Intelligence


File Origin
# of uploads :
1
# of downloads :
115
Origin country :
DE DE
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Deleting a recently created file
Creating a file in the %temp% subdirectories
Creating a process from a recently created file
Runs as daemon
Connection attempt
Sets a written file as executable
Creating a file in the %temp% directory
Creating a file
Creates directories in a subdirectory of a temporary directory
Creates directories
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
bash gcc lolbin remote
Result
Threat name:
n/a
Detection:
malicious
Classification:
troj.evad
Score:
68 / 100
Signature
Drops files in suspicious directories
Drops invisible ELF files
Malicious sample detected (through community Yara rule)
Sample tries to persist itself using .desktop files
Writes ELF files to hidden directories
Writes identical ELF files to multiple locations
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1695310 Sample: aarch64.elf Startdate: 20/05/2025 Architecture: LINUX Score: 68 155 109.202.202.202, 80 INIT7CH Switzerland 2->155 157 91.189.91.42, 443 CANONICAL-ASGB United Kingdom 2->157 159 2 other IPs or domains 2->159 173 Malicious sample detected (through community Yara rule) 2->173 15 aarch64.elf 2->15         started        19 dash rm 2->19         started        21 dash rm 2->21         started        signatures3 process4 file5 131 /tmp/systemd-priva...ig/.update-103e34e5, ELF 15->131 dropped 133 /tmp/systemd-priva...he/.update-3a2c79a3, ELF 15->133 dropped 135 /tmp/systemd-priva...ig/.update-3030988b, ELF 15->135 dropped 137 6 other malicious files 15->137 dropped 161 Writes ELF files to hidden directories 15->161 163 Writes identical ELF files to multiple locations 15->163 165 Sample tries to persist itself using .desktop files 15->165 167 Drops invisible ELF files 15->167 23 aarch64.elf 15->23         started        signatures6 process7 process8 25 aarch64.elf 23->25         started        file9 85 /usr/local/sbin/update, ELF 25->85 dropped 87 /usr/local/sbin/lists, ELF 25->87 dropped 177 Writes identical ELF files to multiple locations 25->177 29 aarch64.elf update 25->29         started        33 aarch64.elf lists 25->33         started        signatures10 process11 file12 97 /tmp/systemd-priva...rt/.update-55918c09, ELF 29->97 dropped 99 /tmp/systemd-priva...ig/.update-21568879, ELF 29->99 dropped 101 /root/snap/.config...rt/.update-4e581dbd, ELF 29->101 dropped 109 6 other malicious files 29->109 dropped 187 Writes ELF files to hidden directories 29->187 189 Writes identical ELF files to multiple locations 29->189 191 Sample tries to persist itself using .desktop files 29->191 35 update 29->35         started        103 /tmp/systemd-priva...rt/.update-1b988395, ELF 33->103 dropped 105 /tmp/systemd-priva...ig/.update-42c70fcc, ELF 33->105 dropped 107 /root/snap/.config...rt/.update-5363040b, ELF 33->107 dropped 111 6 other malicious files 33->111 dropped 193 Drops invisible ELF files 33->193 37 lists 33->37         started        signatures13 process14 process15 39 update 35->39         started        43 lists 37->43         started        file16 77 /usr/local/sbin/updater, ELF 39->77 dropped 79 /usr/local/sbin/servers, ELF 39->79 dropped 175 Writes identical ELF files to multiple locations 39->175 45 update servers 39->45         started        49 update updater 39->49         started        81 /usr/local/bin/update, ELF 43->81 dropped 83 /usr/local/bin/lists, ELF 43->83 dropped 51 lists lists 43->51         started        53 lists update 43->53         started        signatures17 process18 file19 113 /tmp/systemd-priva...art/.update-53cb0d7, ELF 45->113 dropped 123 8 other malicious files 45->123 dropped 195 Writes ELF files to hidden directories 45->195 197 Writes identical ELF files to multiple locations 45->197 199 Sample tries to persist itself using .desktop files 45->199 55 servers 45->55         started        115 /tmp/systemd-priva...art/.update-5326258, ELF 49->115 dropped 125 8 other malicious files 49->125 dropped 201 Drops invisible ELF files 49->201 57 updater 49->57         started        117 /tmp/systemd-priva...rt/.update-322f502e, ELF 51->117 dropped 119 /tmp/systemd-priva...ig/.update-75840421, ELF 51->119 dropped 127 7 other malicious files 51->127 dropped 59 lists 51->59         started        121 /tmp/systemd-priva...rt/.update-2a25fc36, ELF 53->121 dropped 129 8 other malicious files 53->129 dropped 61 update 53->61         started        signatures20 process21 process22 63 servers 55->63         started        67 updater 57->67         started        69 lists 59->69         started        71 update 61->71         started        file23 139 /usr/sbin/update, ELF 63->139 dropped 141 /usr/local/bin/servers, ELF 63->141 dropped 169 Writes identical ELF files to multiple locations 63->169 171 Drops files in suspicious directories 63->171 73 servers servers 63->73         started        143 /usr/sbin/lists, ELF 67->143 dropped 145 /usr/local/bin/updater, ELF 67->145 dropped 147 /usr/sbin/updater, ELF 69->147 dropped 149 /usr/bin/lists, ELF 69->149 dropped 151 /usr/sbin/servers, ELF 71->151 dropped 153 /usr/bin/update, ELF 71->153 dropped signatures24 process25 file26 89 /tmp/systemd-priva...rt/.update-64042fc4, ELF 73->89 dropped 91 /tmp/systemd-priva...ig/.update-6f8c9301, ELF 73->91 dropped 93 /root/snap/.config...rt/.update-70dc369b, ELF 73->93 dropped 95 6 other malicious files 73->95 dropped 179 Writes ELF files to hidden directories 73->179 181 Writes identical ELF files to multiple locations 73->181 183 Sample tries to persist itself using .desktop files 73->183 185 Drops invisible ELF files 73->185 signatures27
Threat name:
Linux.Trojan.SAgnt
Status:
Malicious
First seen:
2025-05-20 17:48:24 UTC
File Type:
ELF64 Little (Exe)
AV detection:
12 of 36 (33.33%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  1/10
Tags:
linux
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:F01_s1ckrule
Author:s1ckb017
Rule name:ldpreload
Author:xorseed
Reference:https://stuff.rop.io/
Rule name:linux_generic_ipv6_catcher
Author:@_lubiedo
Description:ELF samples using IPv6 addresses
Rule name:malwareelf55503
Rule name:setsockopt
Author:Tim Brown @timb_machine
Description:Hunts for setsockopt() red flags
Rule name:unixredflags3
Author:Tim Brown @timb_machine
Description:Hunts for UNIX red flags

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

elf dc110aed2780301cabcc4e5d626023337129aefc21b8d0ef292d8f2a50c5d98e

(this sample)

  
Delivery method
Distributed via web download

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_PIEMissing Position-Independent Executable (PIE) Protectionhigh

Comments