🦠
Severity: CRITICAL

Mirai

Type: Unknown

SHA25676ae6d577ba96b1c3a1de8b21c32a9faf6040f7e78d98269e0469d896c29dc64
First Capture12/29/2025
Last Activity2/22/2026
Countries5
🎯
67
Times Captured
🌍
5
Countries
πŸ–₯️
29
Source IPs
πŸ›‘οΈ
0
AV Detections
πŸ”¬

MalwareBazaar Intelligence

abuse.ch β€’ Updated: 12/31/2025

View in MalwareBazaar β†—
FamilyMirai
File Typeelf(233.8 KB)
First seen in MB9/11/2024
Tags
elfMirai
YARA Rules (4)
Detect_Malicious_VBScript_Base64
by daniyyell
Detects malicious VBScript patterns, including Base64 decoding, file operations, and PowerShell.
enterpriseunix2
by Tim Brown @timb_machine
Enterprise UNIX
linux_generic_ipv6_catcher
by @_lubiedo
ELF samples using IPv6 addresses
unixredflags3
by Tim Brown @timb_machine
Hunts for UNIX red flags
Vendor Intel (9)
Triage
Detected
vxCube
malware2
InQuest
MALICIOUS
Intezer
malicious
YOROI_YOMI
Legit File
FileScan-IO
LIKELY_MALICIOUS
CERT-PL_MWDB
Detected
Spamhaus_HBL
Detected