MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 e15e93db3ce3a8a22adb4b18e0e37b93f39c495e4a97008f9b1a9a42e1fac2b0. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 3


Intelligence 3 IOCs YARA File information Comments

SHA256 hash: e15e93db3ce3a8a22adb4b18e0e37b93f39c495e4a97008f9b1a9a42e1fac2b0
SHA3-384 hash: 16c5a2e36cc4b5a23724b0bfc27892b33670d4b601b2eff9337d098398adc6cd8a6a9340fc7db3d130dbf3e728a5556d
SHA1 hash: 034c8c51a58be11ca620ce3eb0d43d5a59275d2f
MD5 hash: 9a111588a7db15b796421bd13a949cd4
humanhash: carpet-floor-colorado-december
File name:e15e93db3ce3a8a22adb4b18e0e37b93f39c495e4a97008f9b1a9a42e1fac2b0
Download: download sample
Signature Mirai
File size:95'268 bytes
First seen:2020-03-23 17:27:24 UTC
Last seen:2025-03-21 16:50:32 UTC
File type: elf
MIME type:application/x-executable
ssdeep 1536:pymLLU1F5kHIrIj0D6rhfd+lK3exiTCzxNtI4sZLi6UEbFEBFaW1EH6t6wfPP/Q:2F+ooxalK3exiTOijZLdUEbFlWPP/Q
TLSH B2930272135417C5894772B4209409F5363AA265FCBF34FBBF93C66027834BCD49BAA2
Reporter Marco_Ramilli
Tags:gafgyt

Intelligence


File Origin
# of uploads :
18
# of downloads :
248
Origin country :
n/a
Vendor Threat Intelligence
Result
Threat name:
Detection:
malicious
Classification:
spre.troj.evad
Score:
100 / 100
Signature
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Connects to many ports of the same IP (likely port scanning)
Drops files in suspicious directories
Executes the "iptables" command to insert, remove and/or manipulate rules
Multi AV Scanner detection for submitted file
Sample is packed with UPX
Sample tries to persist itself using /etc/profile
Sample tries to persist itself using System V runlevels
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Uses known network protocols on non-standard ports
Yara detected Mirai
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 241268 Sample: 7v1ic5IS8I Startdate: 24/06/2020 Architecture: LINUX Score: 100 83 104.18.212.109 unknown United States 2->83 85 100.0.36.253 UUNET-MCICommunicationsServicesIncdbaVerizonBusi United States 2->85 87 98 other IPs or domains 2->87 97 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->97 99 Antivirus detection for dropped file 2->99 101 Antivirus / Scanner detection for submitted sample 2->101 103 5 other signatures 2->103 11 7v1ic5IS8I 2->11         started        13 upstart sh 2->13         started        15 upstart sh 2->15         started        17 upstart sh 2->17         started        signatures3 process4 process5 19 7v1ic5IS8I 11->19         started        21 sh date 13->21         started        23 sh apport-checkreports 13->23         started        25 sh date 15->25         started        27 sh apport-gtk 15->27         started        29 sh date 17->29         started        31 sh apport-gtk 17->31         started        process6 33 7v1ic5IS8I 19->33         started        file7 75 /usr/networks, ELF 33->75 dropped 77 /etc/rcS.d/S95baby.sh, POSIX 33->77 dropped 79 /etc/rc.local, ASCII 33->79 dropped 81 19 other malicious files 33->81 dropped 91 Sample tries to persist itself using /etc/profile 33->91 93 Drops files in suspicious directories 33->93 95 Sample tries to persist itself using System V runlevels 33->95 37 7v1ic5IS8I 33->37         started        39 7v1ic5IS8I sh 33->39         started        41 7v1ic5IS8I sh 33->41         started        43 11 other processes 33->43 signatures8 process9 process10 45 7v1ic5IS8I sh 37->45         started        47 7v1ic5IS8I sh 37->47         started        49 7v1ic5IS8I sh 37->49         started        51 7v1ic5IS8I sh 37->51         started        53 sh iptables 39->53         started        56 sh iptables 41->56         started        58 sh iptables 43->58         started        60 sh iptables 43->60         started        62 4 other processes 43->62 signatures11 64 sh iptables 45->64         started        67 sh iptables 47->67         started        69 sh iptables 49->69         started        71 sh iptables 51->71         started        105 Executes the "iptables" command to insert, remove and/or manipulate rules 53->105 73 iptables modprobe 53->73         started        process12 signatures13 89 Executes the "iptables" command to insert, remove and/or manipulate rules 64->89
Gathering data
Threat name:
Linux.Trojan.Gafgyt
Status:
Malicious
First seen:
2019-12-01 08:02:12 UTC
File Type:
ELF32 Little (Exe)
AV detection:
18 of 31 (58.06%)
Threat level:
  5/5
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

elf e15e93db3ce3a8a22adb4b18e0e37b93f39c495e4a97008f9b1a9a42e1fac2b0

(this sample)

  
Delivery method
Distributed via web download

Comments