🦠
Severity: LOW

Mirai

Type: Unknown

SHA2565e0d8b0fb08ed7a09db2058f7c1442f54fa7528c8c5339cd2d9a88a96ad8ff36
First Capture1/15/2026
Last Activity1/15/2026
Countries1
🎯
1
Times Captured
🌍
1
Countries
🖥️
1
Source IPs
🛡️
0
AV Detections
🔬

MalwareBazaar Intelligence

abuse.ch • Updated: 1/15/2026

View in MalwareBazaar
FamilyMirai
File Typeelf(137.5 KB)
First seen in MB1/15/2026
Tags
elfMirai
YARA Rules (7)
CP_Script_Inject_Detector
by DiegoAnalytics
Detects attempts to inject code into another process across PE, ELF, Mach-O binaries
ELF_Toriilike_persist
by 4r4
Detects Torii IoT Botnet (stealthier Mirai alternative)
linux_generic_ipv6_catcher
by @_lubiedo
ELF samples using IPv6 addresses
Linux_Generic_Threat_d94e1020
by Elastic Security
Linux_Trojan_Gafgyt_28a2fe0c
by Elastic Security
setsockopt
by Tim Brown @timb_machine
Hunts for setsockopt() red flags
Vendor Intel (8)
Triage
mirai
InQuest
Detected
Intezer
malicious
YOROI_YOMI
Legit File
FileScan-IO
Detected
CERT-PL_MWDB
Detected
Spamhaus_HBL
Detected
ReversingLabs
MALICIOUS

Countries of Origin

Antivirus Detections (0)

No antivirus detections recorded

Source IPs

Severity

15
/100
LowMediumHighCritical