MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 06fa1106e374c6f498243e883890f973d3c19d4ee8ec9b181e43f9372352448b. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: 06fa1106e374c6f498243e883890f973d3c19d4ee8ec9b181e43f9372352448b
SHA3-384 hash: 95d26971cfbf5fcec5362189c5dc5a086b4f083d01de0fa3ee972c6287d97e7af82833896e6e0e82bb82932d0ee5b5c2
SHA1 hash: 65d166ae1821d00009a85be0417d23fca17cff0c
MD5 hash: 64f01375646e27668ba6d114e1dc562e
humanhash: foxtrot-cola-fish-crazy
File name:ipc
Download: download sample
Signature Mirai
File size:618 bytes
First seen:2025-03-07 01:36:46 UTC
Last seen:Never
File type: sh
MIME type:text/plain
ssdeep 12:afWU9nVfWAttuYnVfWs5/BnVfWRaLBS2nVfW2NITpYnVfWb/CnN:eWUnWAtECWo/7WRaLBSEW2NINCWLY
TLSH T128F01DA9005EFE42C0ECEEA9B135F4BBB031825E004F1B4DBEC5047DA48C551B134EC9
Magika shell
Reporter abuse_ch
Tags:sh
URLMalware sample (SHA256 hash)SignatureTags
http://176.65.134.5/splmips46894ab0365d99a0bb377497478ebabe75c295d6119ab5dce7c7c1ea90086efa Miraielf mirai
http://176.65.134.5/splmpslf135cf3046be829d6f1b7ef020c5dd9eca385aed561d782f8b4d03220a2a833d Miraielf mirai
http://176.65.134.5/splarm0c173caa930b8d384c6ae942987c9c0f51371f12f585a0e34d3b4e13d89f5b5b Miraielf mirai
http://176.65.134.5/splarm5c7bf13560d86a03a4b2d614105f2f45340652ebaad205c82194af27448b9b8ff Miraielf mirai
http://176.65.134.5/splarm6f2128b77af9e414b09f8427f9b1efee438971b7a99478031cb81eb99df1831e1 Miraielf mirai
http://176.65.134.5/splarm78312daded7f34a6803e7ed28ad921c93020cb2c865d669bb4a528e7a9c94ee01 Miraielf mirai

Intelligence


File Origin
# of uploads :
1
# of downloads :
123
Origin country :
DE DE
Vendor Threat Intelligence
Verdict:
Malicious
Score:
94.1%
Tags:
mirai agent virus hype
Result
Verdict:
UNKNOWN
Threat name:
Linux.Trojan.Generic
Status:
Suspicious
First seen:
2025-03-07 05:48:23 UTC
File Type:
Text (Shell)
AV detection:
11 of 38 (28.95%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
discovery
Behaviour
Modifies registry class
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh 06fa1106e374c6f498243e883890f973d3c19d4ee8ec9b181e43f9372352448b

(this sample)

  
Delivery method
Distributed via web download

Comments