MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 f1c2f1ffa26c4e443d12cac3498193701b59ee2394387d52b07b9c41be537fdd. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 10


Intelligence 10 IOCs YARA File information Comments

SHA256 hash: f1c2f1ffa26c4e443d12cac3498193701b59ee2394387d52b07b9c41be537fdd
SHA3-384 hash: e303433aba914e42f45a254b1912da3da7d4cb9615e1d356497981e8941edaea0455d9d1f881fa90e5b4f68086db6eb0
SHA1 hash: 4c3042122a074e723641232d3da8b6257b6c2c18
MD5 hash: 3549bca0ce24e1b255c8d50cbff89f51
humanhash: wolfram-august-aspen-happy
File name:boatnet.ppc
Download: download sample
Signature Mirai
File size:50'608 bytes
First seen:2026-01-31 11:47:38 UTC
Last seen:Never
File type: elf
MIME type:application/x-executable
ssdeep 768:+x4rT0M6NIYnCTsTDr6aIwUSAk42hftkSGsv6H1ILt6S:T0NNQTsHrjbjfTS1Ip6S
TLSH T1FA335C02775C0E43C42A2AF4353F23E5D7EFEAA120E4F585694E9A46C175E33059AEEC
Magika elf
Reporter abuse_ch
Tags:elf mirai upx-dec


Avatar
abuse_ch
UPX decompressed file, sourced from SHA256 a2ded513c4266461de5786f3304cd28b0e9622815e279080052146f96b59bf63
File size (compressed) :24'408 bytes
File size (de-compressed) :50'608 bytes
Format:linux/ppc32
Packed file: a2ded513c4266461de5786f3304cd28b0e9622815e279080052146f96b59bf63

Intelligence


File Origin
# of uploads :
1
# of downloads :
54
Origin country :
NL NL
Vendor Threat Intelligence
Malware configuration found for:
Mirai
Details
Mirai
an XOR decryption key and at least a c2 socket address
Verdict:
Unknown
Threat level:
  0/10
Confidence:
100%
Tags:
masquerade
Verdict:
Malicious
File Type:
elf.32.be
First seen:
2026-01-31T00:37:00Z UTC
Last seen:
2026-01-31T13:48:00Z UTC
Hits:
~10
Detections:
HEUR:Backdoor.Linux.Mirai.b
Status:
terminated
Behavior Graph:
%3 guuid=c953f44d-1b00-0000-6ebf-7e86d10a0000 pid=2769 /usr/bin/sudo guuid=7303aa50-1b00-0000-6ebf-7e86d50a0000 pid=2773 /tmp/sample.bin guuid=c953f44d-1b00-0000-6ebf-7e86d10a0000 pid=2769->guuid=7303aa50-1b00-0000-6ebf-7e86d50a0000 pid=2773 execve
Result
Threat name:
n/a
Detection:
malicious
Classification:
spre
Score:
60 / 100
Signature
Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Sample tries to kill multiple processes (SIGKILL)
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1860879 Sample: boatnet.ppc.elf Startdate: 31/01/2026 Architecture: LINUX Score: 60 24 169.254.169.254, 80 USDOSUS Reserved 2->24 26 45.137.98.97, 3778, 56234 AS43260TR Lithuania 2->26 28 daisy.ubuntu.com 2->28 30 Antivirus / Scanner detection for submitted sample 2->30 32 Multi AV Scanner detection for submitted file 2->32 7 boatnet.ppc.elf 2->7         started        9 xfce4-panel wrapper-2.0 2->9         started        11 xfce4-panel wrapper-2.0 2->11         started        13 7 other processes 2->13 signatures3 process4 process5 15 boatnet.ppc.elf 7->15         started        18 boatnet.ppc.elf 7->18         started        20 boatnet.ppc.elf 7->20         started        22 wrapper-2.0 xfpm-power-backlight-helper 9->22         started        signatures6 34 Sample tries to kill multiple processes (SIGKILL) 15->34
Threat name:
Linux.Worm.Mirai
Status:
Malicious
First seen:
2026-01-31 05:29:40 UTC
File Type:
ELF32 Big (Exe)
AV detection:
22 of 36 (61.11%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:mirai botnet:lzrd linux
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

elf f1c2f1ffa26c4e443d12cac3498193701b59ee2394387d52b07b9c41be537fdd

(this sample)

  
Delivery method
Distributed via web download

Comments