🦠
Severity: LOW

Mirai

Type: Unknown

SHA256edd36921560633342eafed3cd855211f4d8ea6aac5dc6d82842841fdb8ebefd4
First Capture1/15/2026
Last Activity1/15/2026
Countries1
🎯
1
Times Captured
🌍
1
Countries
🖥️
1
Source IPs
🛡️
0
AV Detections
🔬

MalwareBazaar Intelligence

abuse.ch • Updated: 1/15/2026

View in MalwareBazaar
FamilyMirai
File Typeelf(225.5 KB)
First seen in MB1/15/2026
Tags
elfGafgytMirai
YARA Rules (10)
CP_Script_Inject_Detector
by DiegoAnalytics
Detects attempts to inject code into another process across PE, ELF, Mach-O binaries
ELF_Toriilike_persist
by 4r4
Detects Torii IoT Botnet (stealthier Mirai alternative)
F01_s1ckrule
by s1ckb017
ldpreload
by xorseed
linux_generic_ipv6_catcher
by @_lubiedo
ELF samples using IPv6 addresses
Linux_Generic_Threat_8299c877
by Elastic Security
Vendor Intel (8)
Triage
mirai
InQuest
Detected
Intezer
malicious
YOROI_YOMI
Legit File
FileScan-IO
UNKNOWN
CERT-PL_MWDB
mirai
Spamhaus_HBL
Detected
ReversingLabs
MALICIOUS

Countries of Origin

Antivirus Detections (0)

No antivirus detections recorded

Source IPs

Severity

15
/100
LowMediumHighCritical