MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 f4b98ae33b05968a5b336a658ef5a771b5143d2178906c240916baedb9e16952. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 9


Intelligence 9 IOCs YARA File information Comments

SHA256 hash: f4b98ae33b05968a5b336a658ef5a771b5143d2178906c240916baedb9e16952
SHA3-384 hash: 517189017a98e301134f8031ee439d96bdf29f237b126648fd4df01e88e03aad2ce0cebae8c17d874e9e7ecdbbc9cff6
SHA1 hash: 19cabb3eb297786ba554281b4593201f3799a182
MD5 hash: b4cb4d0b2c6db56e15e5e84c7a61d13e
humanhash: apart-skylark-butter-comet
File name:mips
Download: download sample
Signature Mirai
File size:201'900 bytes
First seen:2025-11-19 22:27:20 UTC
Last seen:Never
File type: elf
MIME type:application/x-executable
ssdeep 3072:U6W9P5rprBprrnlZk3UvAQheyqVEIV5KauuSz:aP5rprBdZZkkB9q2IOaujz
TLSH T13814A81E6F228F7DF6A8873057F78D21976C33D626E1D685D1ACC2101E6029E641FFA8
telfhash t1404140580e7817f4a3399c89059dff7ad6a330db7e166c378e11e46aa769a839d10c0c
Magika elf
Reporter abuse_ch
Tags:elf mirai upx-dec


Avatar
abuse_ch
UPX decompressed file, sourced from SHA256 c8bdd38673aff456b1ba6ad0a7765d180157a8235ca7113ef04b32dad5cb80ea
File size (compressed) :60'560 bytes
File size (de-compressed) :201'900 bytes
Format:linux/mips
Packed file: c8bdd38673aff456b1ba6ad0a7765d180157a8235ca7113ef04b32dad5cb80ea

Intelligence


File Origin
# of uploads :
1
# of downloads :
96
Origin country :
NL NL
Vendor Threat Intelligence
Result
Verdict:
Clean
Maliciousness:

Behaviour
Connection attempt
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
mirai
Verdict:
Malicious
Uses P2P?:
false
Uses anti-vm?:
false
Architecture:
mips
Packer:
not packed
Botnet:
unknown
Number of open files:
0
Number of processes launched:
1
Processes remaning?
false
Remote TCP ports scanned:
not identified
Behaviour
no suspicious findings
Botnet C2s
TCP botnet C2(s):
not identified
UDP botnet C2(s):
not identified
Verdict:
Malicious
File Type:
elf.32.be
First seen:
2025-11-19T20:35:00Z UTC
Last seen:
2025-11-20T00:09:00Z UTC
Hits:
~10
Status:
terminated
Behavior Graph:
%3 guuid=081c22b1-1800-0000-b3d0-34a8110e0000 pid=3601 /usr/bin/sudo guuid=a46c6fb3-1800-0000-b3d0-34a81a0e0000 pid=3610 /tmp/sample.bin guuid=081c22b1-1800-0000-b3d0-34a8110e0000 pid=3601->guuid=a46c6fb3-1800-0000-b3d0-34a81a0e0000 pid=3610 execve
Gathering data
Result
Threat name:
n/a
Detection:
clean
Classification:
n/a
Score:
2 / 100
Behaviour
Behavior Graph:
n/a
Threat name:
Linux.Backdoor.Mirai
Status:
Malicious
First seen:
2025-11-19 22:28:21 UTC
File Type:
ELF32 Big (Exe)
AV detection:
8 of 36 (22.22%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:mirai discovery
Behaviour
System Network Configuration Discovery
Verdict:
Malicious
Tags:
Unix.Trojan.Mirai-8041698-0
YARA:
n/a
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

elf f4b98ae33b05968a5b336a658ef5a771b5143d2178906c240916baedb9e16952

(this sample)

  
Delivery method
Distributed via web download

Comments