Black friday Up to 3 extra licenses FOR FREE + Special offer for TI LOOKUP Get it now
Webinar
February 26
Better SOC with Interactive Sandbox Practical Use Cases
Register now

Mirai

56
Global rank
40 infographic chevron month
Month rank
38 infographic chevron week
Week rank
0
IOCs

Mirai is a self-propagating malware that scans the internet for vulnerable IoT devices and infects them to create a botnet. Mirai variants utilize lists of common default credentials to gain access to devices. Mirai's primary use is for launching distributed denial-of-service (DDoS) attacks, but it has also been used for cryptocurrency mining.

Botnet
Type
USA
Origin
1 September, 2016
First seen
22 November, 2025
Last seen

How to analyze Mirai with ANY.RUN

Type
USA
Origin
1 September, 2016
First seen
22 November, 2025
Last seen

IOCs

IP addresses
181.225.149.247
177.188.94.100
201.238.0.244
119.123.76.233
123.11.37.128
59.94.100.185
182.247.149.144
118.36.113.109
196.185.119.41
59.178.67.110
123.175.54.196
181.225.148.219
182.246.57.58
181.5.249.167
1.70.99.13
111.92.10.204
1.48.38.194
88.238.25.110
59.178.0.251
112.86.153.79
Hashes
ad9c490813f5002cda86d665c6dd31f8df2a42abedc3cb10cefcae13e934930d
2423c19f3fa5ddc98fc8c734aea73fa477f04ed1233a8eddd00156b819e218b8
0ef44ca96baef8389c183c8d8ee77f2b92b4e97f26c7aa957e0488f0a42dc526
9938651cd4c87ed5b7f4c9837a2b46a0c2ebb75b34c325800ff0f9f95d6894ba
63c88d51ae43fe6f7bb8fe59e04c929802d60e635aa434ce3d23b3ba84c3b741
8ab38316dd9c8b70c1e4d601770ba222b4c5f342a772681e1763910be14170c4
ea8926384858a5355ea0e7d754ef801c4b03af3839c6473bc5b60fc21fa0430c
08f8e782c0fd940635f303262cc9f5b73cf58c0c95cb2410114c0332753e3461
984e3565cdf897a62523a6776c16835634be7312a415d8c36c56ce14545539d7
6f1da6623189a369e919942eda96a280333476c065f7f52dc104835e7784c7b0
d733c30cdcfa05cb279e4a8c3f7cf092d48c6c4dec7025a90f2a153b05914cee
3a7ec96897b3ebdcbfcfbd512861c1a32d0c50db51c989727141a4f9ad837aa3
67fa1fdd741361dcf8166030b0f8ba08d5783626b670e6634ec2fb12787af32e
ce277882232c954e57d5759a0f9a6a0017d55b4b5e2e5ecc582b5c5c171795dc
ffee0e6b7173221b17db16db6f57a20be846bcc0991f6788ba75dfcd3a308ebf
c721abbdeaf2852ea602291ab947efc11ee71b1563875003c0a84c153aa784d6
b79ea5e0d1a8ebed13a68bc544a60dc82dd08b9f2658b8a04e0d98bce2335d8a
36829995308538e94b3c3846142dad7a686e78b6dd1951b1b72ee889bca45bcf
e5efb3bd5132c70ee1682df8843ae4fc41c351fe1566822e9c022c95f36c3d5b
e5e417983c0137f8ae88030c1ceb9da556b329afa1f5a6c085e509a3b26726e0
Domains
scan.rapeme.fun
xabolfpzbz.ukrainianhorseriding.com
iotlmao.xyz
anunna.club
blaskjar.xyz
a.deadnig.ga
rippr.cc
syntheticincenseonline.com
scan.casualaffinity.net
ev0lve.cf
hoaxcalls.pw
hromofreah.top
vstress.pw
fksdjfaksj321bots.mybiadboats.xyz
panel.devilsden.net
saturnbotnet.net
search-dl1.com
modem.pw
lmaoiot.xyz
cnc.luxstresser.xyz
Last Seen at

Recent blog posts

post image
Detected in 60 Seconds: How to Identify Phish...
watchers 448
comments 0
post image
LOLBin Attacks Explained with Examples: Every...
watchers 2246
comments 0
post image
Healthcare MSSP Cuts Phishing Triage by 76% a...
watchers 485
comments 0

What is Mirai malware?

Mirai is a botnet that has been targeting Internet of Things (IoT) devices since September 2016. It initially gained notoriety with denial-of-service attacks on several high-profile targets, including Krebs on Security, a blog run by the notable cybersecurity expert and journalist Brian Krebs. The botnet exploited the lack of security in IoT devices in the form of weak passwords, using them to generate massive traffic to overwhelm the target services.

The original developers, three college students from the United States, made the Mirai malware source code public in 2017 in an attempt to demonstrate their willingness to abandon criminal activity. However, this led to the creation of numerous variants of the malware, such as Hajime and Sylveon, as well as an influx of new threat actors employing these in their attacks.

Since then, the botnet has been experiencing a continuous evolution, gaining additional capabilities and exploiting new vulnerabilities found in different devices. It has been employed in numerous campaigns, by 2022 becoming one the largest botnets. According to some estimates, the Mirai malware has been used to infect over half a million IoT products.

Mirai's rise and scale can be attributed to a combination of factors. These include efficient spreading based on Internet-wide scanning and the widespread use of insecure default passwords in IoT products.

Get started today for free

Analyze malware and phishing in a fully-interactive sandbox

Create free account

Mirai malware technical details

On the basic level, Mirai uses brute forcing to infect new devices. Here are the four stages that define its typical operation:

  • It begins by scanning the internet for vulnerable IoT devices by sending TCP probes to IPv4 addresses.
  • Once it identifies a potential victim, it attempts to log in using a list of popular credentials.
  • Upon successful login, the malware uses its loader module to download and execute a malicious program on the device. Once a device is infected, it becomes part of the botnet and begins scanning the internet for other vulnerable devices to infect.
  • Mirai then engages the infected devices to launch DDoS attacks.

The malware usually communicates with the command-and-control (C2) over the TCP protocol. Yet, there are also TLS-capable variants.

After establishing its presence on a device, Mirai kills any processes associated with the activity of other botnets, such as Gafgyt, that might have infected it prior.

Over the past years, Mirai variants have been able to infect thousands of devices by abusing various vulnerabilities. For instance, in 2020, one Mirai variant took advantage of a security flaw (CVE-2020-9054) in Zyxel NAS devices, which allowed the malware to employ special characters to inject malicious commands and take control of devices.

Another vulnerability used by Mirai, which was identified in Comtrend VR-3033 routers in 2020, was CVE-2020-10173. It enabled attackers to compromise the network managed by the router by injecting malicious commands into its authentication process.

In 2022, Mirai was observed to explore the Spring4Shell vulnerability (CVE-2022-22965) by uploading its executable to target devices’ '/tmp' folder and leveraging the 'chmod' command to launch it.

Many variants of Mirai implement modified UPX packing to complicate the analysis process of their executables and make them more lightweight.

One of the latest variants of Mirai, NoaBot, which was first spotted in 2024, leverages SSH login brute forcing capabilities. Instead of launching DDoS attacks, it turns infected devices into crypto-mining machines.

Mirai execution process

Let’s take a look at how a typical Mirai malware attack unfolds by submitting a sample of this malware to the ANY.RUN sandbox.

Mirai infects the Ubuntu system typically through exposed and vulnerable Telnet or SSH ports. Once access is gained, Mirai downloads its binary from a C2server or through a peer-to-peer network onto the infected system.

To ensure persistence, Mirai may attempt to disable security software, delete competing malware, and create copies of itself in various system directories. It may also modify system startup scripts or use cron jobs to ensure it is executed on system reboot.

The infected system starts scanning the internet for other vulnerable devices by randomly generating IP addresses and attempting to log in using the same list of default credentials, infecting more devices.

The infected device establishes a connection with a C2 server to receive instructions from the botnet operator. These instructions can include launching DDoS attacks, downloading additional payloads, or updating.

It's important to note that the exact execution chain can vary depending on the variant of Mirai and the specific configuration of the infected system.

Mirai Suricata rule in ANY.RUN Suricata rule used for detecting Mirai in ANY.RUN

Mirai malware distribution methods

Unlike most malware families, such as Remcos and NjRAT, Mirai is not distributed via phishing emails or other common attack vectors. Instead, since it is a botnet, Mirai relies on self-propagation. This allows the botnet to grow rapidly and become more powerful, enabling it to launch larger and more devastating attacks.

Conclusion

To protect against Mirai and its variants, it is important to ensure that all IoT devices are secured with strong, unique passwords and that any known vulnerabilities are patched as soon as possible. To conduct Mirai malware analysis to see how the latest variants operate, use the ANY.RUN sandbox.

By executing Mirai in a controlled environment, you can observe its behavior and network activity without risking infection of your own infrastructure. This will enable you to identify the vulnerabilities employed by the malware, as well as expose its C2 servers.

Sign up for ANY.RUN now – it’s free!

HAVE A LOOK AT

Salvador Stealer screenshot
Salvador Stealer
salvador
Salvador Stealer is a powerful, information-stealing Android malware designed to silently infiltrate systems, extract sensitive data, and exfiltrate it to cybercriminals. Often sold on underground forums, it is part of the growing ecosystem of “stealers-as-a-service” (SaaS) tools that target individuals and organizations alike.
Read More
X-Files screenshot
X-Files
xfiles
X-FILES Stealer is a sophisticated malware designed to infiltrate systems and steal sensitive information, targeting login credentials for email, social media, and other personal accounts. It captures data and transmits it back to the attacker’s command-and-control server. X-FILES Stealer employs advanced evasion techniques to avoid detection, making it a persistent threat in the cyber landscape.
Read More
XRed screenshot
XRed
xred
XRed operates as a stealthy backdoor, enabling cybercriminals to gain unauthorized remote access to infected systems. XRed has gained particular notoriety for its distribution through trojanized legitimate software and hardware drivers, making it exceptionally dangerous due to its ability to masquerade as trusted applications.
Read More
BTMOB RAT screenshot
BTMOB RAT
btmob
BTMOB RAT is a remote access Trojan (RAT) designed to give attackers full control over infected devices. It targets Windows and Android endpoints. Its modular structure allows operators to tailor capabilities, making it suitable for espionage, credential theft, financial fraud, and establishing long-term footholds in corporate networks.
Read More
PureCrypter screenshot
PureCrypter
purecrypter
First identified in March 2021, PureCrypter is a .NET-based loader that employs obfuscation techniques, such as SmartAssembly, to evade detection. It has been used to distribute malware families including AgentTesla, RedLine Stealer, and SnakeKeylogger. The malware is typically delivered through phishing campaigns and malicious downloads, often masquerading as legitimate files with extensions like .mp4 or .pdf. PureCrypter utilizes encryption and compression to conceal its payloads and can inject malicious code into legitimate processes to maintain persistence on the infected system.
Read More
WarmCookie screenshot
WarmCookie
badspace
WarmCookie is a backdoor malware that cyber attackers use to gain initial access to targeted systems. It is often distributed through phishing emails, frequently using job recruitment lures to entice victims into downloading and executing the malware.
Read More