MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 0ad846071ab74504511930aa589b7038abad15eea2004136b67bf9764ac6d7ba. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: 0ad846071ab74504511930aa589b7038abad15eea2004136b67bf9764ac6d7ba
SHA3-384 hash: 33251e99638a4796838e87929464ac0d98196fe82cd7a294038da1ce624b45777af718ea9a2ea181b8f9a5715a844ea5
SHA1 hash: ee7cb815772837d534ed0792e9e4ce1679e2d3cf
MD5 hash: ea5c5b68ffcdb8928019e3f712e7ccbb
humanhash: magazine-happy-cola-oklahoma
File name:bo
Download: download sample
Signature Mirai
File size:477 bytes
First seen:2025-01-08 16:01:15 UTC
Last seen:Never
File type: sh
MIME type:text/plain
ssdeep 12:oqjQeFKKqXT9HfcmKqHDJKqbKKqBKqTNFi:oqj9qpfcDqjoqbHqgqTNFi
TLSH T1D1F082CF12736714808B6E2D71A2CFA4F055D6C813860F9EBDF85636C0CCA247435BA4
Magika txt
Reporter abuse_ch
Tags:sh
URLMalware sample (SHA256 hash)SignatureTags
http://103.136.41.100/12bac0343b8cf8a210de3ebf552587890aabfc5cecc3906c6048ecc087b17f4570 Miraielf mirai ua-wget
http://103.136.41.100/25e5b205976b03a708da3dd55172bbd71ea8aae872016075f53b452329c484e3e Miraimirai ua-wget
http://103.136.41.100/3dde922a53c0fd584c17a298afd97676438d7755c364d5e909faef5b325986e35 Miraimirai ua-wget
http://103.136.41.100/45b351fbbc59d7b63707fb38f5e3f2e987a1dd6dfbed9452e80a500371b5e4c63 Miraimirai ua-wget
http://103.136.41.100/5e573c446480edbfb49b799a99f817028cf3db6c7127208568af46bdb5cbbb1c2 Miraimirai ua-wget
http://103.136.41.100/66f0bd044c41dfbc1734df26b0df2bc09136b03ed9887d1650ab0befeacd6f197 Miraielf mirai ua-wget

Intelligence


File Origin
# of uploads :
1
# of downloads :
91
Origin country :
DE DE
Vendor Threat Intelligence
Verdict:
Malicious
Score:
95.7%
Tags:
mirai agent hype sage
Threat name:
Linux.Trojan.Medusa
Status:
Malicious
First seen:
2025-01-08 16:26:06 UTC
File Type:
Text (Python)
AV detection:
10 of 24 (41.67%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
discovery
Behaviour
Modifies registry class
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh 0ad846071ab74504511930aa589b7038abad15eea2004136b67bf9764ac6d7ba

(this sample)

  
Delivery method
Distributed via web download

Comments