MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 ea894a9b49149b83f6e02b76da784792a01fc0a06027ed99e220e12c611c3d3a. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 8


Intelligence 8 IOCs YARA File information Comments

SHA256 hash: ea894a9b49149b83f6e02b76da784792a01fc0a06027ed99e220e12c611c3d3a
SHA3-384 hash: 29acf3feef3612c375c6b62d3e4342d52c2b3ba1d486a5a9e2f85effc4f0506f784da096cf6dac9e8588e431e5288758
SHA1 hash: c24efd7972484fff79e80e2ae7d1abfd5db9114e
MD5 hash: c7c5d58e114e4788e1e92e46f59d1b33
humanhash: winter-eighteen-vermont-lake
File name:sora.arm
Download: download sample
Signature Mirai
File size:25'004 bytes
First seen:2022-04-21 18:50:04 UTC
Last seen:Never
File type: elf
MIME type:application/x-executable
ssdeep 768:5X9nxn8o9wnBoWzEQf2EjKb3pAjks3UozU:5tn+o9wjfBAZWzU
TLSH T17FB2C0727015B8A3C6E600775EE9DE83FB800EF8D0E473291465099DEAD5C42ABF1247
TrID 50.1% (.) ELF Executable and Linkable format (Linux) (4022/12)
49.8% (.O) ELF Executable and Linkable format (generic) (4000/1)
Reporter tolisec
Tags:mirai

Intelligence


File Origin
# of uploads :
1
# of downloads :
288
Origin country :
n/a
Vendor Threat Intelligence
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
anti-debug mirai
Verdict:
Malicious
Uses P2P?:
false
Uses anti-vm?:
false
Architecture:
arm
Packer:
UPX
Botnet:
185.44.81.86:80/bins
Number of open files:
56
Number of processes launched:
17
Processes remaning?
true
Remote TCP ports scanned:
23
Behaviour
Process Renaming
Botnet C2s
TCP botnet C2(s):
185.44.81.86:1312
UDP botnet C2(s):
not identified
Result
Verdict:
MALICIOUS
Result
Threat name:
Detection:
malicious
Classification:
spre.troj.evad
Score:
68 / 100
Signature
Multi AV Scanner detection for submitted file
Sample is packed with UPX
Sample tries to kill multiple processes (SIGKILL)
Uses known network protocols on non-standard ports
Yara detected Mirai
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 613441 Sample: sora.arm Startdate: 21/04/2022 Architecture: LINUX Score: 68 30 175.110.237.160, 23 WITRIBE-AS-APWITRIBEPAKISTANLIMITEDPK Saudi Arabia 2->30 32 88.149.62.182 VODAFONE_ICELANDIS Iceland 2->32 34 98 other IPs or domains 2->34 36 Multi AV Scanner detection for submitted file 2->36 38 Yara detected Mirai 2->38 40 Uses known network protocols on non-standard ports 2->40 42 Sample is packed with UPX 2->42 9 sora.arm 2->9         started        signatures3 process4 process5 11 sora.arm 9->11         started        13 sora.arm 9->13         started        16 sora.arm 9->16         started        signatures6 18 sora.arm 11->18         started        20 sora.arm 11->20         started        23 sora.arm 11->23         started        25 sora.arm 11->25         started        48 Sample tries to kill multiple processes (SIGKILL) 13->48 process7 signatures8 27 sora.arm 18->27         started        44 Sample tries to kill multiple processes (SIGKILL) 20->44 process9 signatures10 46 Sample tries to kill multiple processes (SIGKILL) 27->46
Threat name:
Linux.Trojan.Mirai
Status:
Malicious
First seen:
2022-04-21 18:51:08 UTC
File Type:
ELF32 Little (Exe)
AV detection:
20 of 26 (76.92%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  1/10
Tags:
linux
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

elf ea894a9b49149b83f6e02b76da784792a01fc0a06027ed99e220e12c611c3d3a

(this sample)

  
Delivery method
Distributed via web download

Comments