MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 0427bbb70f9d537e614c7cda3612ff099018917ee518646a701ad713afc4e02a. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments 1

SHA256 hash: 0427bbb70f9d537e614c7cda3612ff099018917ee518646a701ad713afc4e02a
SHA3-384 hash: 07d908a4104cb2e7e5cadebf0641018028da511674f58503d2cbd3e68400654987b0ce71a5a368e69d21221a86f28b5d
SHA1 hash: 9118ca31d8f67bc144cbe8dffe149987a7f2e4ea
MD5 hash: 8dd761aa7de019a371eb51b15db29500
humanhash: mockingbird-happy-mountain-avocado
File name:c.sh
Download: download sample
Signature Mirai
File size:531 bytes
First seen:2025-04-17 15:55:30 UTC
Last seen:Never
File type: sh
MIME type:text/plain
ssdeep 12:3J3H+jTHxjgYOHCjxNIl5wH7jna0LKJH8WjVmHNWjftHR8jp9J:3J3qRgY1xNI7uBK5VQCfLgHJ
TLSH T11AF05EBC24A7A7472605DF49F46A96CDB13BE6EE5072CE61E09D3C2465A81107031B65
Magika txt
Reporter abuse_ch
Tags:sh
URLMalware sample (SHA256 hash)SignatureTags
http://213.209.143.24/arm221b2b8ec945324c54d467df7fbeb4d7a8eb97e20c3a2a2dd0a9b09c599e0cfd Gafgytelf ua-wget
http://213.209.143.24/arm56d04d6cc458082f1dd5233ac5b8b048c7d67c6a2a431e4750cf2b4366a0bdb74 Miraielf mirai
http://213.209.143.24/arm63b50d951810dc7e8bb7b9cf9d95d33ffaf55e50ca4ff15dded98a4198ecdef4e Miraielf mirai
http://213.209.143.24/arm75d11b9be5daa65fe010cc7900d5d5eead7f62a7885e862a5971a005856ae9878 Miraielf mirai
http://213.209.143.24/mips01453889de074520278d104c051ba80147706206ac12ccb4da2f07dc660872bb Miraielf mirai
http://213.209.143.24/mpslc081dbcab79688429efe181b099a18cd061bf0fd33da3d9f8b6bddf82bb99032 Miraielf mirai
http://213.209.143.24/x864a113a9f858520ad3dfa772fd30838a2a19855041941b35326a750d4c887089a Miraielf gafgyt mirai

Intelligence


File Origin
# of uploads :
1
# of downloads :
80
Origin country :
DE DE
Vendor Threat Intelligence
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
anti-vm anti-vm lolbin mirai remote
Threat name:
Document-HTML.Trojan.Heuristic
Status:
Malicious
First seen:
2025-04-17 15:56:25 UTC
File Type:
Text
AV detection:
9 of 24 (37.50%)
Threat level:
  2/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Modifies registry class
Suspicious use of SetWindowsHookEx
Enumerates physical storage devices
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh 0427bbb70f9d537e614c7cda3612ff099018917ee518646a701ad713afc4e02a

(this sample)

  
Delivery method
Distributed via web download

Comments



Avatar
commented on 2025-04-17 17:36:46 UTC

Script contents suggest Mirai:
IOCs - 213[.]209[.]143[.]24/arm , /arm5, /arm6, /arm7 , /mips, /mpsl, /x86