Skip to content

Hide Navigation Hide TOC

Mirai (fcdfd4af-da35-49a8-9610-19be8a487185)

Mirai (Japanese for "the future", 未来) is a malware that turns networked devices running Linux into remotely controlled "bots" that can be used as part of a botnet in large-scale network attacks. It primarily targets online consumer devices such as IP cameras and home routers. The Mirai botnet was first found in August 2016 by MalwareMustDie, a whitehat malware research group, and has been used in some of the largest and most disruptive distributed denial of service (DDoS) attacks, including an attack on 20 September 2016 on computer security journalist Brian Krebs's web site, an attack on French web host OVH, and the October 2016 Dyn cyberattack.

Cluster A Galaxy A Cluster B Galaxy B Level
Mirai (ELF) (17e12216-a303-4a00-8283-d3fe92d0934c) Malpedia Mirai (fcdfd4af-da35-49a8-9610-19be8a487185) Botnet 1
Mirai (dcbf1aaa-1fdd-4bfc-a35e-145ffdfb5ac5) Tool Mirai (fcdfd4af-da35-49a8-9610-19be8a487185) Botnet 1
Owari (f24ad5ca-04c5-4cd0-bd72-209ebce4fdbc) Botnet Mirai (fcdfd4af-da35-49a8-9610-19be8a487185) Botnet 1
Mirai (fcdfd4af-da35-49a8-9610-19be8a487185) Botnet Sora (025ab0ce-bffc-11e8-be19-d70ec22c5d56) Botnet 1
Mirai (ELF) (17e12216-a303-4a00-8283-d3fe92d0934c) Malpedia Mirai (dcbf1aaa-1fdd-4bfc-a35e-145ffdfb5ac5) Tool 2
Mirai (dcbf1aaa-1fdd-4bfc-a35e-145ffdfb5ac5) Tool Owari (f24ad5ca-04c5-4cd0-bd72-209ebce4fdbc) Botnet 2
Mirai (dcbf1aaa-1fdd-4bfc-a35e-145ffdfb5ac5) Tool Sora (025ab0ce-bffc-11e8-be19-d70ec22c5d56) Botnet 2
Owari (ec67f206-6464-48cf-a012-3cdfc1278488) Malpedia Owari (f24ad5ca-04c5-4cd0-bd72-209ebce4fdbc) Botnet 2
Owari (f24ad5ca-04c5-4cd0-bd72-209ebce4fdbc) Botnet Sora (025ab0ce-bffc-11e8-be19-d70ec22c5d56) Botnet 2