MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 1484e2d8bcf10bb3e0ee51c4f946d3bb95934ce78aa7b39856e33db84da150b8. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 5


Intelligence 5 IOCs YARA File information Comments

SHA256 hash: 1484e2d8bcf10bb3e0ee51c4f946d3bb95934ce78aa7b39856e33db84da150b8
SHA3-384 hash: 397211cc519becf70e651493e9c92f112b9deb1dca62550c91f1f09044ff2b83d0dd40fd0140a954137c1e6b71d86eed
SHA1 hash: 01590dc2340f63415223dff34978b40ca1b57021
MD5 hash: dea544676f39b2fa15885569fb0405f8
humanhash: hotel-four-papa-don
File name:t.sh
Download: download sample
Signature Mirai
File size:4'905 bytes
First seen:2025-12-15 00:41:18 UTC
Last seen:Never
File type: sh
MIME type:text/plain
ssdeep 96:1xFGHbSkckpXawIBmjjaYgEdXwiRJXSh6x:mzXawIBmjjabEdXwinXSh6x
TLSH T1F6A118D97AA21737CDE0DD6AFA1649BA2042E1C49C76EFD4F49C30BCB4A7DC4E280945
Magika txt
Reporter abuse_ch
Tags:mirai sh
URLMalware sample (SHA256 hash)SignatureTags
http://158.94.208.162/z/89/mips1ef86f38b7e44a7511f09e4bec9a1da105e70db6d522467ac14b4ea42df632c9 Miraielf mirai ua-wget
http://158.94.208.162/z/89/mpslb3af651dbf2ffce881ed5539fcb7a3371f94f301eb4f7ac757d6aba63e5e1038 Miraielf mirai ua-wget
http://158.94.208.162/z/89/x86_649c033cf8304f0ed83cbba11c153b4fa29d766a90e57b1e8b715b9d25ef05ed76 Miraielf mirai ua-wget
http://158.94.208.162/z/89/arm4n/an/aelf ua-wget
http://158.94.208.162/z/89/arm571ecf29f0548ecb0051046067bf46b3966c596a554bde739db08900b38198918 Miraielf mirai ua-wget
http://158.94.208.162/z/89/arm628d8a15cfb38b9e56722fac60e7b53c84f53fcd678a62f67e82312be67b88bd7 Miraielf mirai ua-wget
http://158.94.208.162/z/89/arm78730e029d0f40e909494760198bd41b3a6aa44843a8968910cff20dea0fc35ca Miraielf mirai ua-wget

Intelligence


File Origin
# of uploads :
1
# of downloads :
43
Origin country :
DE DE
Vendor Threat Intelligence
No detections
Verdict:
Malicious
File Type:
text
First seen:
2025-12-14T16:55:00Z UTC
Last seen:
2025-12-15T00:37:00Z UTC
Hits:
~10
Threat name:
Linux.Downloader.Medusa
Status:
Malicious
First seen:
2025-12-15 00:42:15 UTC
File Type:
Text (Shell)
AV detection:
17 of 36 (47.22%)
Threat level:
  3/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Modifies registry class
Suspicious use of SetWindowsHookEx
Enumerates physical storage devices
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh 1484e2d8bcf10bb3e0ee51c4f946d3bb95934ce78aa7b39856e33db84da150b8

(this sample)

  
Delivery method
Distributed via web download

Comments