MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 de3224c13674a53f82101bd77199dffeead83dca7381af0190ee7fa567c34b90. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments 1

SHA256 hash: de3224c13674a53f82101bd77199dffeead83dca7381af0190ee7fa567c34b90
SHA3-384 hash: 05085058dee747890afe64e65053cb37cbfc93608fcb0241b58ec96d521199a635cc32246757aa2ce551a983a0843676
SHA1 hash: d743ad0df64a400155f9d25351a473af516684d8
MD5 hash: ac666560cbc32f1cb97538cf9b5494f1
humanhash: speaker-nebraska-network-tennessee
File name:ac666560cbc32f1cb97538cf9b5494f1
Download: download sample
Signature Mirai
File size:27'824 bytes
First seen:2022-05-17 19:03:30 UTC
Last seen:2022-05-23 21:00:05 UTC
File type: elf
MIME type:application/x-executable
ssdeep 384:jC5mFKkqUYzETHJPdaCCeU8U9eWoDfi37Cp57dsxnCesMfd67F9ONrW0hymdGUoq:gmoSzdda79UjG38axnJsUVw0s3UozG
TLSH T124C2E07561A8BC74D690C4BC9F1D46C136EB0F788BEC756E690845F03AC869468BCDE2
TrID 50.1% (.) ELF Executable and Linkable format (Linux) (4022/12)
49.8% (.O) ELF Executable and Linkable format (generic) (4000/1)
Reporter zbetcheckin
Tags:32 arm elf mirai

Intelligence


File Origin
# of uploads :
8
# of downloads :
249
Origin country :
n/a
Vendor Threat Intelligence
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
anti-debug mirai
Verdict:
Malicious
Uses P2P?:
false
Uses anti-vm?:
false
Architecture:
arm
Packer:
UPX
Botnet:
unknown
Number of open files:
0
Number of processes launched:
0
Processes remaning?
false
Remote TCP ports scanned:
not identified
Behaviour
no suspicious findings
Botnet C2s
TCP botnet C2(s):
not identified
UDP botnet C2(s):
not identified
Result
Verdict:
UNKNOWN
Result
Threat name:
Detection:
malicious
Classification:
troj.evad
Score:
60 / 100
Signature
Multi AV Scanner detection for submitted file
Sample is packed with UPX
Yara detected Mirai
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 628700 Sample: 15urJkiTwS Startdate: 17/05/2022 Architecture: LINUX Score: 60 42 69.47.64.232 WOW-INTERNETUS United States 2->42 44 219.82.255.137 WASUHZHuashumediaNetworkLimitedCN China 2->44 46 98 other IPs or domains 2->46 48 Multi AV Scanner detection for submitted file 2->48 50 Yara detected Mirai 2->50 52 Sample is packed with UPX 2->52 10 15urJkiTwS 2->10         started        signatures3 process4 process5 12 15urJkiTwS 10->12         started        14 15urJkiTwS 10->14         started        16 15urJkiTwS 10->16         started        process6 18 15urJkiTwS 12->18         started        20 15urJkiTwS 12->20         started        22 15urJkiTwS 14->22         started        24 15urJkiTwS 14->24         started        26 15urJkiTwS 14->26         started        process7 28 15urJkiTwS 18->28         started        30 15urJkiTwS 18->30         started        32 15urJkiTwS 18->32         started        34 15urJkiTwS 22->34         started        36 15urJkiTwS 22->36         started        process8 38 15urJkiTwS 28->38         started        40 15urJkiTwS 28->40         started       
Threat name:
Linux.Trojan.Mirai
Status:
Malicious
First seen:
2022-05-17 19:04:06 UTC
File Type:
ELF32 Little (Exe)
AV detection:
19 of 26 (73.08%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  1/10
Tags:
linux
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

elf de3224c13674a53f82101bd77199dffeead83dca7381af0190ee7fa567c34b90

(this sample)

  
Delivery method
Distributed via web download

Comments



Avatar
zbet commented on 2022-05-17 19:03:43 UTC

url : hxxp://85.202.169.170/webos/whoareyou.arm