MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 0a108b0c0d6050f7cec6c9ab3faa005f9b063fdc92097907fd2b6299f625a1e2. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: 0a108b0c0d6050f7cec6c9ab3faa005f9b063fdc92097907fd2b6299f625a1e2
SHA3-384 hash: 0ca6ac0f7479292fef7b7ad9b8de12bfe191f1cd1e3704a7c96bb349d1718db2e5161b1a777d3ce506293b8d1a963e93
SHA1 hash: 329178a116099a8ae433ea1384eb1046ae1314e0
MD5 hash: da1b32b0ec138d243d6a6c547e52b2f3
humanhash: grey-nuts-nine-rugby
File name:kws.sh
Download: download sample
Signature Mirai
File size:167 bytes
First seen:2025-12-21 15:14:28 UTC
Last seen:2025-12-23 10:17:21 UTC
File type: sh
MIME type:text/plain
ssdeep 3:LxAjdVZVb8NBzSa+ANja0lvJRDxAjdVZVCONBzSa5Ap9C3oITI0n:L6VbkPjnJRD6Vxy03Vdn
TLSH T1DDC0129F10265681C048AE2021D2341DB1418B8626610B1D9AD91033B8CDA00B748D50
Magika shell
Reporter abuse_ch
Tags:sh
URLMalware sample (SHA256 hash)SignatureTags
http://130.12.180.64/splmipsdcb690747a11527c5ad9919521ffd27a29563f24c19df3d7f9218fdea6e88622 Miraielf mirai ua-wget
http://130.12.180.64/splmpsl0cffd5f3473dde6aecb03030cb95efa81c7e1a1bc218528dc318348af422c8cc Miraielf mirai ua-wget

Intelligence


File Origin
# of uploads :
2
# of downloads :
38
Origin country :
DE DE
Vendor Threat Intelligence
No detections
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
mirai
Verdict:
Malicious
File Type:
text
First seen:
2025-12-21T13:44:00Z UTC
Last seen:
2025-12-21T15:02:00Z UTC
Hits:
~10
Status:
terminated
Behavior Graph:
%3 guuid=7ffad755-1a00-0000-b77e-10c8990b0000 pid=2969 /usr/bin/sudo guuid=dadc5758-1a00-0000-b77e-10c89b0b0000 pid=2971 /tmp/sample.bin guuid=7ffad755-1a00-0000-b77e-10c8990b0000 pid=2969->guuid=dadc5758-1a00-0000-b77e-10c89b0b0000 pid=2971 execve guuid=057a9958-1a00-0000-b77e-10c89c0b0000 pid=2972 /usr/bin/wget net send-data guuid=dadc5758-1a00-0000-b77e-10c89b0b0000 pid=2971->guuid=057a9958-1a00-0000-b77e-10c89c0b0000 pid=2972 execve f22fee75-ab34-540d-95fe-696883c6f4ad 130.12.180.64:80 guuid=057a9958-1a00-0000-b77e-10c89c0b0000 pid=2972->f22fee75-ab34-540d-95fe-696883c6f4ad send: 135B
Threat name:
Win32.Trojan.Vigorf
Status:
Malicious
First seen:
2025-12-21 15:15:47 UTC
File Type:
Text (Shell)
AV detection:
4 of 24 (16.67%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Modifies registry class
Suspicious use of SetWindowsHookEx
Enumerates physical storage devices
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh 0a108b0c0d6050f7cec6c9ab3faa005f9b063fdc92097907fd2b6299f625a1e2

(this sample)

  
Delivery method
Distributed via web download

Comments