MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 2f7909e29f5f7710d7946d852ef417e5f6175c8f51b58fdcfb640076fa60b58c. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: 2f7909e29f5f7710d7946d852ef417e5f6175c8f51b58fdcfb640076fa60b58c
SHA3-384 hash: 9b90434cb2c8569d69384223318bd692abe0d282811ab876926c7b71b726b0a5a31955c3c8497090dcbf66216137baa8
SHA1 hash: 49c1986ebe80694317414e9deb6c7cc5df8e5398
MD5 hash: 029f8d6404c1b8bb8552534466682a43
humanhash: bravo-march-maryland-florida
File name:skidb.sh
Download: download sample
Signature Mirai
File size:184 bytes
First seen:2025-12-21 15:14:37 UTC
Last seen:Never
File type: sh
MIME type:text/plain
ssdeep 3:L08NDhVZVb8ZBBFSa+TSJarjKPJVtOVR3VZVCOdFSa5T69/KO:LdDhVb+2f+PJVtkVxMKO
TLSH T11EC0C9AE00197981C088AF647565305EE684465A26360744EAC930A2FC8E611A728E60
Magika txt
Reporter abuse_ch
Tags:sh
URLMalware sample (SHA256 hash)SignatureTags
http://130.12.180.64/splmips4a3b75e3f968337924dfc92ac11b62ec56ce5fd449e0e0d3e3dfd50273c9d3d6 Miraielf mirai ua-wget
http://130.12.180.64/splmpsl5a8d30683a937ecf56f6e06cf1f9eb7c9de187e68b4ba1d214eae22a5f1e5bec Miraielf mirai ua-wget

Intelligence


File Origin
# of uploads :
1
# of downloads :
44
Origin country :
DE DE
Vendor Threat Intelligence
No detections
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
evasive mirai
Verdict:
Malicious
File Type:
text
First seen:
2025-12-21T12:37:00Z UTC
Last seen:
2025-12-22T16:06:00Z UTC
Hits:
~10
Status:
terminated
Behavior Graph:
%3 guuid=2a1da6de-1800-0000-a704-bc7bf50e0000 pid=3829 /usr/bin/sudo guuid=c424a9e2-1800-0000-a704-bc7b000f0000 pid=3840 /tmp/sample.bin guuid=2a1da6de-1800-0000-a704-bc7bf50e0000 pid=3829->guuid=c424a9e2-1800-0000-a704-bc7b000f0000 pid=3840 execve guuid=498052e3-1800-0000-a704-bc7b010f0000 pid=3841 /usr/bin/rm guuid=c424a9e2-1800-0000-a704-bc7b000f0000 pid=3840->guuid=498052e3-1800-0000-a704-bc7b010f0000 pid=3841 execve guuid=d3af14e4-1800-0000-a704-bc7b050f0000 pid=3845 /usr/bin/wget net send-data guuid=c424a9e2-1800-0000-a704-bc7b000f0000 pid=3840->guuid=d3af14e4-1800-0000-a704-bc7b050f0000 pid=3845 execve f22fee75-ab34-540d-95fe-696883c6f4ad 130.12.180.64:80 guuid=d3af14e4-1800-0000-a704-bc7b050f0000 pid=3845->f22fee75-ab34-540d-95fe-696883c6f4ad send: 135B
Threat name:
Win32.Trojan.Vigorf
Status:
Malicious
First seen:
2025-12-21 15:16:36 UTC
File Type:
Text (Shell)
AV detection:
6 of 24 (25.00%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Modifies registry class
Suspicious use of SetWindowsHookEx
Enumerates physical storage devices
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh 2f7909e29f5f7710d7946d852ef417e5f6175c8f51b58fdcfb640076fa60b58c

(this sample)

  
Delivery method
Distributed via web download

Comments