🦠
Schweregrad: NIEDRIG

Mirai

Typ: Unknown

SHA2565e0d8b0fb08ed7a09db2058f7c1442f54fa7528c8c5339cd2d9a88a96ad8ff36
Erste Erfassung15.1.2026
Letzte Aktivitat15.1.2026
Lander1
🎯
1
Mal Erfasst
🌍
1
Lander
🖥️
1
Quell-IPs
🛡️
0
AV-Erkennungen
🔬

MalwareBazaar-Intelligenz

abuse.ch • Aktualisiert: 15.1.2026

In MalwareBazaar ansehen
FamilieMirai
Dateitypelf(137.5 KB)
Erstmals in MB gesehen15.1.2026
Tags
elfMirai
YARA-Regeln (7)
CP_Script_Inject_Detector
by DiegoAnalytics
Detects attempts to inject code into another process across PE, ELF, Mach-O binaries
ELF_Toriilike_persist
by 4r4
Detects Torii IoT Botnet (stealthier Mirai alternative)
linux_generic_ipv6_catcher
by @_lubiedo
ELF samples using IPv6 addresses
Linux_Generic_Threat_d94e1020
by Elastic Security
Linux_Trojan_Gafgyt_28a2fe0c
by Elastic Security
setsockopt
by Tim Brown @timb_machine
Hunts for setsockopt() red flags
Anbieter-Intel (8)
Triage
mirai
InQuest
Detected
Intezer
malicious
YOROI_YOMI
Legit File
FileScan-IO
Detected
CERT-PL_MWDB
Detected
Spamhaus_HBL
Detected
ReversingLabs
MALICIOUS

Herkunftslander

Antivirus-Erkennungen (0)

Keine Antivirus-Erkennungen registriert

Quell-IPs

Schweregrad

15
/100
NiedrigMittelHochKritisch