MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 e096d860ca936399d461d16fdd57e05fdd83ac35f6b16d246f79e34f93fcb9c0. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 10


Intelligence 10 IOCs YARA File information Comments

SHA256 hash: e096d860ca936399d461d16fdd57e05fdd83ac35f6b16d246f79e34f93fcb9c0
SHA3-384 hash: 442b3d634ca9a7e160a7fe87bbb4bc20b2300047244d230b7b691554564b080ad8131acdf27e050c7275687744c3bf33
SHA1 hash: 8907d10bff26e212fd6d49a8e02e2ae067b786d4
MD5 hash: 5d8eb167b65a8c308d57437ba238c93c
humanhash: july-emma-sixteen-paris
File name:boatnet.spc
Download: download sample
Signature Mirai
File size:54'184 bytes
First seen:2026-01-29 16:41:29 UTC
Last seen:Never
File type: elf
MIME type:application/x-executable
ssdeep 768:yoKR+dWhoDDkFm7nMGWU3NAIZotohCJvM+AEMO+VziNxz:yFvhmkFFG33NAIZotUXVWz
TLSH T1A3334B11FA391A27C0E4B47A12F7832AB1F6479F90A8C74E7D320E8EFF1499059975B1
Magika elf
Reporter abuse_ch
Tags:elf mirai

Intelligence


File Origin
# of uploads :
1
# of downloads :
28
Origin country :
DE DE
Vendor Threat Intelligence
Malware configuration found for:
Mirai
Details
Mirai
an XOR decryption key and at least a c2 socket address
Result
Gathering data
Verdict:
Malicious
File Type:
elf.32.be
Detections:
HEUR:Backdoor.Linux.Mirai.b
Status:
terminated
Behavior Graph:
%3 guuid=170897b4-1a00-0000-e0e1-b2bf620b0000 pid=2914 /usr/bin/sudo guuid=112078b7-1a00-0000-e0e1-b2bf660b0000 pid=2918 /tmp/sample.bin guuid=170897b4-1a00-0000-e0e1-b2bf620b0000 pid=2914->guuid=112078b7-1a00-0000-e0e1-b2bf660b0000 pid=2918 execve
Result
Threat name:
n/a
Detection:
malicious
Classification:
spre
Score:
60 / 100
Signature
Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Sample tries to kill multiple processes (SIGKILL)
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1859922 Sample: boatnet.spc.elf Startdate: 29/01/2026 Architecture: LINUX Score: 60 22 31.56.120.29, 3778, 38142 RASANAIR Iran (ISLAMIC Republic Of) 2->22 24 54.217.10.153, 443, 49576 AMAZON-02US United States 2->24 26 daisy.ubuntu.com 2->26 28 Antivirus / Scanner detection for submitted sample 2->28 30 Multi AV Scanner detection for submitted file 2->30 7 boatnet.spc.elf 2->7         started        9 xfce4-panel wrapper-2.0 2->9         started        11 xfce4-panel wrapper-2.0 2->11         started        13 7 other processes 2->13 signatures3 process4 process5 15 boatnet.spc.elf 7->15         started        18 boatnet.spc.elf 7->18         started        20 boatnet.spc.elf 7->20         started        signatures6 32 Sample tries to kill multiple processes (SIGKILL) 15->32
Threat name:
Linux.Worm.Mirai
Status:
Malicious
First seen:
2026-01-29 12:40:54 UTC
File Type:
ELF32 Big (Exe)
AV detection:
21 of 38 (55.26%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:mirai botnet:lzrd linux
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

elf e096d860ca936399d461d16fdd57e05fdd83ac35f6b16d246f79e34f93fcb9c0

(this sample)

  
Delivery method
Distributed via web download

Comments