MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 e11f32e4217d21a2a6f9d51c6cd84e894286e61ea5ffdda97b2e477814a70159. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments 1

SHA256 hash: e11f32e4217d21a2a6f9d51c6cd84e894286e61ea5ffdda97b2e477814a70159
SHA3-384 hash: b5d2d2c7134c05d61d3660fdf24c1be02264fd78dc5ea216d90ea6b9ae1a300c3a23fd05fd946fa9b7d38248a0d541fb
SHA1 hash: a04346406a38d0f09005caa0bbec5afbb1c2141f
MD5 hash: d81ef52ed5cf620b24ae78efa83d8ac9
humanhash: winter-uncle-batman-maine
File name:d81ef52ed5cf620b24ae78efa83d8ac9
Download: download sample
Signature Mirai
File size:24'052 bytes
First seen:2022-04-19 03:37:19 UTC
Last seen:Never
File type: elf
MIME type:application/x-executable
ssdeep 384:CMmpnBBT3enW9Puy4Oh8WqBGewY9snDMGF+Zr2w/tqStioVy/V218hzJgGlzDpHl:rmBunWkSqunDMdr2w/tFYbN2ahzJgGlr
TLSH T13FB2C0A46A4A49FDD062D43946F307523D7507D2E803EC0278CAED8B7E4A5BC3B46978
TrID 50.1% (.) ELF Executable and Linkable format (Linux) (4022/12)
49.8% (.O) ELF Executable and Linkable format (generic) (4000/1)
Reporter zbetcheckin
Tags:32 elf mips mirai

Intelligence


File Origin
# of uploads :
1
# of downloads :
194
Origin country :
n/a
Vendor Threat Intelligence
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
anti-debug
Verdict:
Malicious
Uses P2P?:
false
Uses anti-vm?:
false
Architecture:
mips
Packer:
UPX
Botnet:
unknown
Number of open files:
1
Number of processes launched:
4
Processes remaning?
false
Remote TCP ports scanned:
37215,5501
Behaviour
no suspicious findings
Botnet C2s
TCP botnet C2(s):
2.56.57.187:34241
UDP botnet C2(s):
not identified
Result
Verdict:
UNKNOWN
Result
Threat name:
Detection:
malicious
Classification:
troj.evad
Score:
60 / 100
Signature
Multi AV Scanner detection for submitted file
Sample is packed with UPX
Yara detected Mirai
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 611069 Sample: V40dnBlB18 Startdate: 19/04/2022 Architecture: LINUX Score: 60 26 Multi AV Scanner detection for submitted file 2->26 28 Yara detected Mirai 2->28 30 Sample is packed with UPX 2->30 8 V40dnBlB18 2->8         started        process3 process4 10 V40dnBlB18 8->10         started        12 V40dnBlB18 8->12         started        14 V40dnBlB18 8->14         started        process5 16 V40dnBlB18 10->16         started        18 V40dnBlB18 10->18         started        20 V40dnBlB18 10->20         started        22 2 other processes 10->22 process6 24 V40dnBlB18 16->24         started       
Threat name:
Linux.Trojan.Mirai
Status:
Malicious
First seen:
2022-04-19 03:38:04 UTC
File Type:
ELF32 Big (Exe)
AV detection:
17 of 26 (65.38%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  10/10
Tags:
discovery linux suricata
Behaviour
Reads runtime system information
Reads system network configuration
Enumerates active TCP sockets
Contacts a large (61580) amount of remote hosts
Creates a large amount of network flows
Modifies the Watchdog daemon
suricata: ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution
suricata: ET MALWARE Mirai Variant User-Agent (Outbound)
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

elf e11f32e4217d21a2a6f9d51c6cd84e894286e61ea5ffdda97b2e477814a70159

(this sample)

  
Delivery method
Distributed via web download

Comments



Avatar
zbet commented on 2022-04-19 03:37:21 UTC

url : hxxp://2.56.57.187/beastmode/b3astmode.mips