MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 07ef3fb9e890a0c21b35302784ecd44d9365bb913e6d933122a9b19b32557d5d. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: 07ef3fb9e890a0c21b35302784ecd44d9365bb913e6d933122a9b19b32557d5d
SHA3-384 hash: 698b980744f5edbb00934bdf9b313d7cde77f9d586ee6e03dc2a25fb01d5586fe43809a5c0ff9a1da000eaba7d2f3fd5
SHA1 hash: bba5ae3e698e666dd1de2d3f34bd7c6a0627de5c
MD5 hash: cc581500cd8a0fc3bfc3604aa7f66caa
humanhash: lactose-six-crazy-undress
File name:tvt
Download: download sample
Signature Mirai
File size:360 bytes
First seen:2025-03-24 15:07:30 UTC
Last seen:2025-03-24 17:07:23 UTC
File type: sh
MIME type:text/x-shellscript
ssdeep 6:hQtIIXbWU3AFFW84MvXIIXbWU3AQF884MvXIIXbWU3ATFW84MvXIIXbWU3AV84MQ:CtIkP3A/WDMvXFP3AQ8DMvXFP3ATMDMU
TLSH T133E0E5BA115209CC420A781AA3DF8424D0D0C28A22D2FB98BDEF5D756A8E6807802ECC
Magika shell
Reporter abuse_ch
Tags:sh
URLMalware sample (SHA256 hash)SignatureTags
http://154.205.128.91/arm602710d628ba476595877ec15648876987485195552c62579e3d6e4cfb624592 Miraielf mirai ua-wget
http://154.205.128.91/arm5d6ba7f1d51072b5d2464a386af1ec2eb4ad42b853eba8f3acbe903272a5653ee Gafgytelf gafgyt mirai ua-wget
http://154.205.128.91/arm6198783c5a2a79fa601aeab32c54580f9c94b661c2fd6045671307891b00ea165 Miraielf gafgyt mirai ua-wget
http://154.205.128.91/arm71528227c8afc93f29fe5968b3bb77c73841b00e58834ae8768d302f3a52308cd Miraielf mirai ua-wget

Intelligence


File Origin
# of uploads :
2
# of downloads :
78
Origin country :
DE DE
Vendor Threat Intelligence
Verdict:
Malicious
Score:
97.4%
Tags:
mirai agent virus hype
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
evasive
Threat name:
Script.Trojan.Multiverze
Status:
Malicious
First seen:
2025-03-24 16:02:34 UTC
File Type:
Text (Shell)
AV detection:
8 of 24 (33.33%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  9/10
Tags:
credential_access defense_evasion discovery linux
Behaviour
Reads runtime system information
Writes file to tmp directory
Changes its process name
Reads process memory
Enumerates running processes
File and Directory Permissions Modification
Executes dropped EXE
Renames itself
Contacts a large (24688) amount of remote hosts
Creates a large amount of network flows
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh 07ef3fb9e890a0c21b35302784ecd44d9365bb913e6d933122a9b19b32557d5d

(this sample)

  
Delivery method
Distributed via web download

Comments