MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 efcad22e622c1dcf537d2c344c993b28b67b2fe8c9b7c28f131059adf72701b3. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 11


Intelligence 11 IOCs YARA File information Comments

SHA256 hash: efcad22e622c1dcf537d2c344c993b28b67b2fe8c9b7c28f131059adf72701b3
SHA3-384 hash: 403e380427463a2bdd125cccbcdeb2675461625365c3c339cfb8c5b4d81958eccc5a690145388a5511d54d917f479d46
SHA1 hash: 7c40d110bd81b3b05c53ec35cafe8a9727141005
MD5 hash: 2144b075c5b4413cfec3703fbf3b62a7
humanhash: finch-virginia-echo-muppet
File name:Josho.mips
Download: download sample
Signature Mirai
File size:69'080 bytes
First seen:2025-12-23 22:59:26 UTC
Last seen:Never
File type: elf
MIME type:application/x-executable
ssdeep 1536:AHNFnXDuPq/SyZBp9tZI0v6bqfg/Kkz73o2x8WW:gNFXDKGrnI0SWYz73o2OF
TLSH T1E263961A3E219FBEFBAC863847B74A219658339622F1C5C4E15CEE015E7034E745FB98
telfhash t175016d58443817f093814c9d6becff76e09140df59625e3b8d00e99ada26a468d00d2c
Magika elf
Reporter abuse_ch
Tags:elf mirai

Intelligence


File Origin
# of uploads :
1
# of downloads :
57
Origin country :
DE DE
Vendor Threat Intelligence
Malware configuration found for:
Mirai
Details
Mirai
an XOR decryption key and at least a c2 socket address
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
masquerade mirai
Result
Gathering data
Status:
terminated
Behavior Graph:
%3 guuid=213d4fcf-1a00-0000-f1f8-f419150b0000 pid=2837 /usr/bin/sudo guuid=0fdd0fd2-1a00-0000-f1f8-f4191d0b0000 pid=2845 /tmp/sample.bin guuid=213d4fcf-1a00-0000-f1f8-f419150b0000 pid=2837->guuid=0fdd0fd2-1a00-0000-f1f8-f4191d0b0000 pid=2845 execve
Result
Threat name:
n/a
Detection:
malicious
Classification:
spre
Score:
60 / 100
Signature
Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Sample tries to kill multiple processes (SIGKILL)
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1838542 Sample: Josho.mips.elf Startdate: 24/12/2025 Architecture: LINUX Score: 60 24 161.6.182.186 WKU-ASUS United States 2->24 26 165.136.47.61 WISCNET1-ASUS United States 2->26 28 98 other IPs or domains 2->28 32 Antivirus / Scanner detection for submitted sample 2->32 34 Multi AV Scanner detection for submitted file 2->34 8 Josho.mips.elf 2->8         started        signatures3 process4 process5 10 Josho.mips.elf 8->10         started        12 Josho.mips.elf 8->12         started        15 Josho.mips.elf 8->15         started        signatures6 17 Josho.mips.elf 10->17         started        20 Josho.mips.elf 10->20         started        22 Josho.mips.elf 10->22         started        36 Sample tries to kill multiple processes (SIGKILL) 12->36 process7 signatures8 30 Sample tries to kill multiple processes (SIGKILL) 17->30
Threat name:
Linux.Worm.Mirai
Status:
Malicious
First seen:
2025-12-23 14:16:51 UTC
File Type:
ELF32 Big (Exe)
AV detection:
25 of 36 (69.44%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:mirai botnet:josho defense_evasion discovery
Behaviour
Reads runtime system information
System Network Configuration Discovery
Changes its process name
Reads system network configuration
Enumerates active TCP sockets
Modifies Watchdog functionality
Contacts a large (43174) amount of remote hosts
Creates a large amount of network flows
Verdict:
Malicious
Tags:
Unix.Dropper.Mirai-7135890-0
YARA:
n/a
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

elf efcad22e622c1dcf537d2c344c993b28b67b2fe8c9b7c28f131059adf72701b3

(this sample)

  
Delivery method
Distributed via web download

Comments