TROYANOSYVIRUS
🦠
Severity: LOW

Mirai

Type: Unknown

SHA256b6a05e2244a46eca59671bad97f27846eaaca8beb3d915dae39140969612650c
First Capture3/18/2026
Last Activity3/18/2026
Countries1
🎯
1
Times Captured
🌍
1
Countries
πŸ–₯️
1
Source IPs
πŸ›‘οΈ
0
AV Detections
πŸ”¬

MalwareBazaar Intelligence

abuse.ch β€’ Updated: 3/18/2026

View in MalwareBazaar β†—
FamilyMirai
File Typeelf(198.0 KB)
First seen in MB3/17/2026
Tags
elfMirai
YARA Rules (10)
ELF_Mirai
by NDA0E
Detects multiple Mirai variants
ELF_Toriilike_persist
by 4r4
Detects Torii IoT Botnet (stealthier Mirai alternative)
jackskid_ddos_botnet
by Nokia Deepfield ERT
Jackskid/RCtea DDoS botnet - all variants
Linux_Generic_Threat_8299c877
by Elastic Security
linux_protocol_doh
by @_lubiedo
DNS-over-HTTPS yara rule
MD5_Constants
by phoul (@phoul)
Look for MD5 constants
Vendor Intel (9)
Triage
Detected
vxCube
malware2
InQuest
Detected
Intezer
unknown
Kaspersky
Malware
FileScan-IO
Detected
CERT-PL_MWDB
mirai
Spamhaus_HBL
Detected

Countries of Origin

Antivirus Detections (0)

No antivirus detections recorded

Source IPs

Severity

15
/100
LowMediumHighCritical