MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 ef0d2c96abb9729ae034b4390e65c27f33a33e473e92d30950a58efcd1362901. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 9


Intelligence 9 IOCs YARA File information Comments

SHA256 hash: ef0d2c96abb9729ae034b4390e65c27f33a33e473e92d30950a58efcd1362901
SHA3-384 hash: e25317ed9af9f1631c59566d5fb55b4135ad1ae472176daa190b7c97178f1f6c47ce2adee39843db11d20f5a4121e8c4
SHA1 hash: 542cf451875d9eb989a7b0f1ab2d844c22aff981
MD5 hash: 76328a783a7e3d953c46933c178849b4
humanhash: ohio-mobile-november-fix
File name:dlr.arm7
Download: download sample
Signature Mirai
File size:1'500 bytes
First seen:2025-07-20 03:33:58 UTC
Last seen:2025-07-20 05:26:53 UTC
File type: elf
MIME type:application/x-executable
ssdeep 24:uAd9KGpa7Urz/jlfGXK1hqVev3gRGH9ilBBuLljj9gD10yd:uA9KGpa7UrLZ1hzmBuJE10yd
TLSH T1C931DFD1A7D04DBDC4A411BEBD9B4714B378AF44E0CE7223822CA3586D2AD7C6D37549
telfhash t1cb900262474fbb68b245018048c90104c5e4e51b0460986145491c404852a107510210
TrID 50.1% (.) ELF Executable and Linkable format (Linux) (4022/12)
49.8% (.O) ELF Executable and Linkable format (generic) (4000/1)
Magika elf
Reporter abuse_ch
Tags:elf mirai

Intelligence


File Origin
# of uploads :
3
# of downloads :
16
Origin country :
DE DE
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file
Sends data to a server
Receives data from a server
Connection attempt
Verdict:
Malicious
Uses P2P?:
false
Uses anti-vm?:
false
Architecture:
arm
Packer:
not packed
Botnet:
unknown
Number of open files:
0
Number of processes launched:
0
Processes remaning?
false
Remote TCP ports scanned:
not identified
Behaviour
no suspicious findings
Botnet C2s
TCP botnet C2(s):
not identified
UDP botnet C2(s):
not identified
Status:
terminated
Behavior Graph:
%3 guuid=e65522b8-1900-0000-1e51-97ebe4080000 pid=2276 /usr/bin/sudo guuid=14899ebb-1900-0000-1e51-97ebeb080000 pid=2283 /tmp/sample.bin guuid=e65522b8-1900-0000-1e51-97ebe4080000 pid=2276->guuid=14899ebb-1900-0000-1e51-97ebeb080000 pid=2283 execve
Result
Threat name:
n/a
Detection:
malicious
Classification:
n/a
Score:
48 / 100
Signature
Multi AV Scanner detection for submitted file
Behaviour
Behavior Graph:
Verdict:
Malicious
Threat:
HEUR:Trojan-Downloader.Linux.Mirai
Threat name:
Linux.Backdoor.Mirai
Status:
Malicious
First seen:
2025-07-20 03:22:45 UTC
File Type:
ELF32 Little (Exe)
AV detection:
11 of 24 (45.83%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  5/10
Tags:
upx
Behaviour
Writes file to tmp directory
UPX packed file
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

elf ef0d2c96abb9729ae034b4390e65c27f33a33e473e92d30950a58efcd1362901

(this sample)

  
Delivery method
Distributed via web download

Comments