MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 0e94fbdf4d50d0719c3db6ac81e847a88b8f24f8b45c1f2962d0dd5f19ce58ac. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: 0e94fbdf4d50d0719c3db6ac81e847a88b8f24f8b45c1f2962d0dd5f19ce58ac
SHA3-384 hash: 9b46a1f85534698ab429bc452e114ce45aa667b5cbcee114dcc5a3ea9af05e4d766ae52d870175de72a136aa93e31e1c
SHA1 hash: e4075353fac142dbce9be559f92694dda2ce2972
MD5 hash: d3d01d4cc63ee900d84aebf9bd1ac847
humanhash: alanine-eleven-apart-beer
File name:o
Download: download sample
Signature Mirai
File size:84 bytes
First seen:2025-12-20 09:34:55 UTC
Last seen:2025-12-20 16:04:15 UTC
File type: sh
MIME type:text/plain
ssdeep 3:L6FT7KDQNUClswWeFGBzSEyLTUWOevn:L6FTODWajNI5v
TLSH T1C6A011AB30203000C808FC0828B20FAC20A382E23A080A0CA0FA0230CCA8A2838A0A08
Magika txt
Reporter abuse_ch
Tags:sh
URLMalware sample (SHA256 hash)SignatureTags
http://6yd.ru/mips7650d567c04ce00a1fa50841f42593319fa13f99c94daefc0febae5b48ab00d4 Mirai32-bit elf mirai ua-wget

Intelligence


File Origin
# of uploads :
2
# of downloads :
35
Origin country :
DE DE
Vendor Threat Intelligence
No detections
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
evasive
Verdict:
Malicious
File Type:
text
First seen:
2025-12-20T07:10:00Z UTC
Last seen:
2025-12-21T07:33:00Z UTC
Hits:
~10
Status:
terminated
Behavior Graph:
%3 guuid=a5566997-1900-0000-b461-55ab6c140000 pid=5228 /usr/bin/sudo guuid=feb5f39a-1900-0000-b461-55ab6d140000 pid=5229 /tmp/sample.bin guuid=a5566997-1900-0000-b461-55ab6c140000 pid=5228->guuid=feb5f39a-1900-0000-b461-55ab6d140000 pid=5229 execve guuid=0189599b-1900-0000-b461-55ab6e140000 pid=5230 /usr/bin/rm guuid=feb5f39a-1900-0000-b461-55ab6d140000 pid=5229->guuid=0189599b-1900-0000-b461-55ab6e140000 pid=5230 execve guuid=1b85c49b-1900-0000-b461-55ab6f140000 pid=5231 /usr/bin/dash guuid=feb5f39a-1900-0000-b461-55ab6d140000 pid=5229->guuid=1b85c49b-1900-0000-b461-55ab6f140000 pid=5231 clone guuid=5cf7e39b-1900-0000-b461-55ab70140000 pid=5232 /usr/bin/chmod guuid=feb5f39a-1900-0000-b461-55ab6d140000 pid=5229->guuid=5cf7e39b-1900-0000-b461-55ab70140000 pid=5232 execve guuid=57f9429c-1900-0000-b461-55ab71140000 pid=5233 /usr/bin/dash guuid=feb5f39a-1900-0000-b461-55ab6d140000 pid=5229->guuid=57f9429c-1900-0000-b461-55ab71140000 pid=5233 clone
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Modifies registry class
Suspicious use of SetWindowsHookEx
Enumerates physical storage devices
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh 0e94fbdf4d50d0719c3db6ac81e847a88b8f24f8b45c1f2962d0dd5f19ce58ac

(this sample)

  
Delivery method
Distributed via web download

Comments