MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 2e8ddd675c8da6e3811609cb436b8b2d978afe0aa5c6ac3eec12d49de331d6b5. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: 2e8ddd675c8da6e3811609cb436b8b2d978afe0aa5c6ac3eec12d49de331d6b5
SHA3-384 hash: 8119cc699e25f9018d1cd45334ecea49703812906cedbf496e65ec1e5b831610b68e5e785e94183b6f304f502ca6bb5a
SHA1 hash: 4d933f52661f9d32a8a7453eba75988a070e5719
MD5 hash: 9d824e7523534cb96957add5f21cfe59
humanhash: mississippi-tennessee-blue-apart
File name:t
Download: download sample
Signature Mirai
File size:3'109 bytes
First seen:2025-04-04 15:47:15 UTC
Last seen:2025-04-05 13:30:25 UTC
File type: sh
MIME type:text/x-shellscript
ssdeep 48:g9SgfIjoBsoIoAhXCWoCJoPtyVHwmfH8xVHWGCdVHZl+ZfP:w5I9VCgyEVH/ExVHHCdVHZl+ZfP
TLSH T14F51D2CC729AD29F4F8D5843AD4D8DAD2166C36B56C0BB43879CFDAD144AB85D50C488
Magika shell
Reporter abuse_ch
Tags:sh
URLMalware sample (SHA256 hash)SignatureTags
http://154.205.128.91/zd2/arm1a6802bea6ffdc55432fc3d7908e79ac74163868d3e6d027e33b27d723b4febc Miraielf mirai ua-wget
http://154.205.128.91/zd2/arm52fe73469585483a503006d519deaa40b780cc4874a583d7e568173bc4bece315 Miraielf mirai ua-wget
http://154.205.128.91/zd2/arm6n/an/aelf ua-wget
http://154.205.128.91/zd2/arm7e84c7c625a0bad135fbb696ae39cd0df03e34bb20508b9b7ef3dcb03cb9d595b Miraielf mirai ua-wget

Intelligence


File Origin
# of uploads :
3
# of downloads :
52
Origin country :
DE DE
Vendor Threat Intelligence
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
busybox evasive expand lolbin remote
Threat name:
Win32.Trojan.Vigorf
Status:
Malicious
First seen:
2025-04-04 15:23:18 UTC
File Type:
Text (Shell)
AV detection:
7 of 24 (29.17%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  9/10
Tags:
credential_access defense_evasion discovery linux
Behaviour
Reads runtime system information
Writes file to tmp directory
Changes its process name
Reads system network configuration
Reads process memory
Enumerates active TCP sockets
Enumerates running processes
File and Directory Permissions Modification
Executes dropped EXE
Renames itself
Unexpected DNS network traffic destination
Creates a large amount of network flows
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh 2e8ddd675c8da6e3811609cb436b8b2d978afe0aa5c6ac3eec12d49de331d6b5

(this sample)

  
Delivery method
Distributed via web download

Comments