🦠
Schweregrad: KRITISCH

Mirai

Typ: Unknown

SHA25676ae6d577ba96b1c3a1de8b21c32a9faf6040f7e78d98269e0469d896c29dc64
Erste Erfassung29.12.2025
Letzte Aktivitat22.2.2026
Lander5
🎯
67
Mal Erfasst
🌍
5
Lander
🖥️
29
Quell-IPs
🛡️
0
AV-Erkennungen
🔬

MalwareBazaar-Intelligenz

abuse.ch • Aktualisiert: 31.12.2025

In MalwareBazaar ansehen
FamilieMirai
Dateitypelf(233.8 KB)
Erstmals in MB gesehen11.9.2024
Tags
elfMirai
YARA-Regeln (4)
Detect_Malicious_VBScript_Base64
by daniyyell
Detects malicious VBScript patterns, including Base64 decoding, file operations, and PowerShell.
enterpriseunix2
by Tim Brown @timb_machine
Enterprise UNIX
linux_generic_ipv6_catcher
by @_lubiedo
ELF samples using IPv6 addresses
unixredflags3
by Tim Brown @timb_machine
Hunts for UNIX red flags
Anbieter-Intel (9)
Triage
Detected
vxCube
malware2
InQuest
MALICIOUS
Intezer
malicious
YOROI_YOMI
Legit File
FileScan-IO
LIKELY_MALICIOUS
CERT-PL_MWDB
Detected
Spamhaus_HBL
Detected