MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 f846869bce0273829deb7c4f736dd45e536a757ac52b21245e6caa6700a7af36. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Gafgyt


Vendor detections: 7


Intelligence 7 IOCs YARA 2 File information Comments

SHA256 hash: f846869bce0273829deb7c4f736dd45e536a757ac52b21245e6caa6700a7af36
SHA3-384 hash: 2793427fb357c73c73d2f659a8e3b488bae854e73c055fd449a4e2f788856810aeb3d93d2fe52b630a1ed80e150f4171
SHA1 hash: f8d2e27b373caa4ebf0bc1980f4e3b9c2481faeb
MD5 hash: 8acda12c19831e78dc788337f4d2af42
humanhash: north-speaker-texas-september
File name:tmips
Download: download sample
Signature Gafgyt
File size:64'100 bytes
First seen:2025-08-28 07:33:07 UTC
Last seen:2025-08-29 06:20:09 UTC
File type: elf
MIME type:application/x-executable
ssdeep 768:vURL+aUxrpETBiGunBbJ/mxNuKdqSzav5l4+bUHWG0gPhaOyrEYe4EMLcIM:8r8QxN1HmQ+bUHv6erMY3
TLSH T19453625E2E319FEDF66CC33547B34A21A26963D523E1D684E2ACD2041F7034D686F7A8
telfhash t1581117088d3867e5ab361d992badfe76e56130df4a265d378d00fdae8a2d8415e01c1c
Magika elf
Reporter abuse_ch
Tags:elf gafgyt mirai

Intelligence


File Origin
# of uploads :
2
# of downloads :
68
Origin country :
DE DE
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Kills processes
Opens a port
Connection attempt
Substitutes an application name
Verdict:
Malicious
Uses P2P?:
false
Uses anti-vm?:
false
Architecture:
mips
Packer:
not packed
Botnet:
unknown
Number of open files:
37
Number of processes launched:
2
Processes remaning?
true
Remote TCP ports scanned:
not identified
Behaviour
Process Renaming
Botnet C2s
TCP botnet C2(s):
not identified
UDP botnet C2(s):
not identified
Status:
terminated
Behavior Graph:
%3 guuid=ae3af4e5-1e00-0000-ba46-da7e2c090000 pid=2348 /usr/bin/sudo guuid=168316e9-1e00-0000-ba46-da7e2d090000 pid=2349 /tmp/sample.bin guuid=ae3af4e5-1e00-0000-ba46-da7e2c090000 pid=2348->guuid=168316e9-1e00-0000-ba46-da7e2d090000 pid=2349 execve guuid=8510b3ee-1e00-0000-ba46-da7e30090000 pid=2352 /usr/bin/dash guuid=168316e9-1e00-0000-ba46-da7e2d090000 pid=2349->guuid=8510b3ee-1e00-0000-ba46-da7e30090000 pid=2352 clone
Result
Threat name:
n/a
Detection:
malicious
Classification:
n/a
Score:
48 / 100
Signature
Multi AV Scanner detection for submitted file
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1766834 Sample: tmips.elf Startdate: 28/08/2025 Architecture: LINUX Score: 48 13 169.254.169.254, 80 USDOSUS Reserved 2->13 15 45.14.224.105, 38558, 38560, 38562 SPECTRAIPSpectraIPBVNL Netherlands 2->15 17 3 other IPs or domains 2->17 19 Multi AV Scanner detection for submitted file 2->19 7 tmips.elf 2->7         started        9 python3.8 dpkg 2->9         started        signatures3 process4 process5 11 tmips.elf 7->11         started       
Threat name:
Linux.Worm.Mirai
Status:
Malicious
First seen:
2025-08-28 06:41:20 UTC
File Type:
ELF32 Big (Exe)
AV detection:
14 of 24 (58.33%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  6/10
Tags:
discovery
Behaviour
Reads runtime system information
System Network Configuration Discovery
Changes its process name
Enumerates running processes
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:CP_AllMal_Detector
Author:DiegoAnalytics
Description:CrossPlatform All Malwares Detector: Detect PE, ELF, Mach-O, scripts, archives; overlay, obfuscation, encryption, spoofing, hiding, high entropy, network communication
Rule name:unixredflags3
Author:Tim Brown @timb_machine
Description:Hunts for UNIX red flags

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Gafgyt

elf f846869bce0273829deb7c4f736dd45e536a757ac52b21245e6caa6700a7af36

(this sample)

Comments