🦠
Severity: LOW
Mirai
Type: Unknown
SHA256
5e0d8b0fb08ed7a09db2058f7c1442f54fa7528c8c5339cd2d9a88a96ad8ff36First Capture1/15/2026
Last Activity1/15/2026
Countries1
🎯
1
Times Captured
🌍
1
Countries
🖥️
1
Source IPs
🛡️
0
AV Detections
FamilyMirai
File Typeelf(137.5 KB)
First seen in MB1/15/2026
Tags
elfMirai
YARA Rules (7)
CP_Script_Inject_Detector
by DiegoAnalytics
Detects attempts to inject code into another process across PE, ELF, Mach-O binaries
ELF_Toriilike_persist
by 4r4
Detects Torii IoT Botnet (stealthier Mirai alternative)
linux_generic_ipv6_catcher
by @_lubiedo
ELF samples using IPv6 addresses
Linux_Generic_Threat_d94e1020
by Elastic Security
Linux_Trojan_Gafgyt_28a2fe0c
by Elastic Security
setsockopt
by Tim Brown @timb_machine
Hunts for setsockopt() red flags
Vendor Intel (8)
Triage
mirai
InQuest
Detected
Intezer
malicious
YOROI_YOMI
Legit File
FileScan-IO
Detected
CERT-PL_MWDB
Detected
Spamhaus_HBL
Detected
ReversingLabs
MALICIOUS
Countries of Origin
Antivirus Detections (0)
No antivirus detections recorded
Source IPs
Severity
15
/100
LowMediumHighCritical