MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 10cabdb2ab9ce107e6fd4a721fd4e89e7b74b063091bc7565e2310b2b2f8ba49. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 3


Intelligence 3 IOCs YARA File information Comments

SHA256 hash: 10cabdb2ab9ce107e6fd4a721fd4e89e7b74b063091bc7565e2310b2b2f8ba49
SHA3-384 hash: f6d270586ac876070aac696a2b3dbdf89c00bd0fe5b34d122ba4afecd9258fc5598676fdc179ff7ff8baffa8bac7f79d
SHA1 hash: cf4fc88447a49d7acd76d21228929f85b901b4bc
MD5 hash: 7f69e36594afa00cc53a809acbe18697
humanhash: alpha-north-hotel-iowa
File name:o.xml
Download: download sample
Signature Mirai
File size:740 bytes
First seen:2025-08-31 07:37:01 UTC
Last seen:2025-09-05 03:16:51 UTC
File type: sh
MIME type:text/plain
ssdeep 12:FH8ioNJAC7ukxGWi2jU30+0K5+A+MjRCkdIkVDClkdIkVDoBjZhG+E6:FH8j/wWi2jz8PdIZSdI3f
TLSH T17801D6BD91BC8A5205B5C5C7B2F15546C491D08BA2EE97E6F38D09266F28CDE3C6320D
Magika xml
Reporter abuse_ch
Tags:sh
URLMalware sample (SHA256 hash)SignatureTags
http://41.216.189.108/00101010101001/morte.x86eb9a8d69e1d6cf3e86860b5d91104b858ade924228d071dbe5496cce62fae767 Miraielf geofenced mirai opendir ua-wget USA

Intelligence


File Origin
# of uploads :
3
# of downloads :
32
Origin country :
DE DE
Vendor Threat Intelligence
Status:
terminated
Behavior Graph:
%3 guuid=f05463de-1a00-0000-6dcd-3e94c6090000 pid=2502 /usr/bin/sudo guuid=f25622e1-1a00-0000-6dcd-3e94cb090000 pid=2507 /tmp/sample.bin guuid=f05463de-1a00-0000-6dcd-3e94c6090000 pid=2502->guuid=f25622e1-1a00-0000-6dcd-3e94cb090000 pid=2507 execve guuid=db9e75e1-1a00-0000-6dcd-3e94cd090000 pid=2509 /usr/bin/dash guuid=f25622e1-1a00-0000-6dcd-3e94cb090000 pid=2507->guuid=db9e75e1-1a00-0000-6dcd-3e94cd090000 pid=2509 clone guuid=17dc88e1-1a00-0000-6dcd-3e94ce090000 pid=2510 /usr/bin/dash guuid=f25622e1-1a00-0000-6dcd-3e94cb090000 pid=2507->guuid=17dc88e1-1a00-0000-6dcd-3e94ce090000 pid=2510 clone guuid=c6d8b2e1-1a00-0000-6dcd-3e94cf090000 pid=2511 /usr/bin/curl net guuid=f25622e1-1a00-0000-6dcd-3e94cb090000 pid=2507->guuid=c6d8b2e1-1a00-0000-6dcd-3e94cf090000 pid=2511 execve a4e02df3-c7fa-5be2-b410-afe687812c07 41.216.189.108:80 guuid=c6d8b2e1-1a00-0000-6dcd-3e94cf090000 pid=2511->a4e02df3-c7fa-5be2-b410-afe687812c07 con
Threat name:
Script-JS.Trojan.Heuristic
Status:
Malicious
First seen:
2025-08-31 07:38:34 UTC
File Type:
Text
AV detection:
6 of 24 (25.00%)
Threat level:
  2/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Modifies registry class
Suspicious use of SetWindowsHookEx
Enumerates physical storage devices
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh 10cabdb2ab9ce107e6fd4a721fd4e89e7b74b063091bc7565e2310b2b2f8ba49

(this sample)

  
Delivery method
Distributed via web download

Comments