MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 177cb2ac0827bc9146f923913bc41da2b53f1675290771144179a109ce1a01d9. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: 177cb2ac0827bc9146f923913bc41da2b53f1675290771144179a109ce1a01d9
SHA3-384 hash: 959287db0d9f30ba3d9a8ee8504b97a0c7c0041a7c0eb3c59c2c543fca9ccd1080141edeaf73ab7b224842474d193bf5
SHA1 hash: 1b69123cc12251d53ba25a93c17ea606802232a0
MD5 hash: ef76698fb23d53d65bbfff319e0c2e2b
humanhash: lemon-fourteen-ohio-nineteen
File name:4g
Download: download sample
Signature Mirai
File size:152 bytes
First seen:2025-12-21 15:14:47 UTC
Last seen:Never
File type: sh
MIME type:text/plain
ssdeep 3:LxAjdVZVb8NBzSa+ANjaziDxAjdVZVCONBzSa5Ap9Mn:L6VbkPjmiD6Vxyyn
TLSH T106C0809F10272641C044BE603151305DB142C5C225700B0D9BD82033F8CD500B75CD10
Magika shell
Reporter abuse_ch
Tags:sh
URLMalware sample (SHA256 hash)SignatureTags
http://130.12.180.64/splmips2928a4694f399990791e7d0c00cb21c7fe852654df493d541097b7ce85815ec5 Miraielf mirai ua-wget
http://130.12.180.64/splmpsl3cd8a62933ca2ee92f4a556c9d59ae1679070eec6343b38d6ef6f75cf5190ced Miraielf mirai ua-wget

Intelligence


File Origin
# of uploads :
1
# of downloads :
38
Origin country :
DE DE
Vendor Threat Intelligence
No detections
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
mirai
Verdict:
Malicious
File Type:
text
First seen:
2025-12-21T13:44:00Z UTC
Last seen:
2025-12-22T15:22:00Z UTC
Hits:
~10
Status:
terminated
Behavior Graph:
%3 guuid=d7935307-1700-0000-bec7-6713760f0000 pid=3958 /usr/bin/sudo guuid=b0383c0a-1700-0000-bec7-67137f0f0000 pid=3967 /tmp/sample.bin guuid=d7935307-1700-0000-bec7-6713760f0000 pid=3958->guuid=b0383c0a-1700-0000-bec7-67137f0f0000 pid=3967 execve guuid=db0a9d0a-1700-0000-bec7-6713830f0000 pid=3971 /usr/bin/wget net send-data write-file guuid=b0383c0a-1700-0000-bec7-67137f0f0000 pid=3967->guuid=db0a9d0a-1700-0000-bec7-6713830f0000 pid=3971 execve guuid=d4409d11-1700-0000-bec7-67139a0f0000 pid=3994 /usr/bin/chmod guuid=b0383c0a-1700-0000-bec7-67137f0f0000 pid=3967->guuid=d4409d11-1700-0000-bec7-67139a0f0000 pid=3994 execve guuid=514af111-1700-0000-bec7-67139b0f0000 pid=3995 /usr/bin/dash guuid=b0383c0a-1700-0000-bec7-67137f0f0000 pid=3967->guuid=514af111-1700-0000-bec7-67139b0f0000 pid=3995 clone guuid=598cb612-1700-0000-bec7-67139f0f0000 pid=3999 /usr/bin/wget net send-data write-file guuid=b0383c0a-1700-0000-bec7-67137f0f0000 pid=3967->guuid=598cb612-1700-0000-bec7-67139f0f0000 pid=3999 execve guuid=7628c817-1700-0000-bec7-6713ae0f0000 pid=4014 /usr/bin/chmod guuid=b0383c0a-1700-0000-bec7-67137f0f0000 pid=3967->guuid=7628c817-1700-0000-bec7-6713ae0f0000 pid=4014 execve guuid=c9c71d18-1700-0000-bec7-6713b00f0000 pid=4016 /usr/bin/dash guuid=b0383c0a-1700-0000-bec7-67137f0f0000 pid=3967->guuid=c9c71d18-1700-0000-bec7-6713b00f0000 pid=4016 clone f22fee75-ab34-540d-95fe-696883c6f4ad 130.12.180.64:80 guuid=db0a9d0a-1700-0000-bec7-6713830f0000 pid=3971->f22fee75-ab34-540d-95fe-696883c6f4ad send: 135B guuid=598cb612-1700-0000-bec7-67139f0f0000 pid=3999->f22fee75-ab34-540d-95fe-696883c6f4ad send: 135B
Threat name:
Script-Shell.Downloader.Heuristic
Status:
Malicious
First seen:
2025-12-21 15:38:18 UTC
File Type:
Text (Shell)
AV detection:
3 of 24 (12.50%)
Threat level:
  2/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Modifies registry class
Suspicious use of SetWindowsHookEx
Enumerates physical storage devices
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh 177cb2ac0827bc9146f923913bc41da2b53f1675290771144179a109ce1a01d9

(this sample)

  
Delivery method
Distributed via web download

Comments