MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 36410af75071ed0d2d90a37243b317c8e0ab142a97dab3806e565013899e6485. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: 36410af75071ed0d2d90a37243b317c8e0ab142a97dab3806e565013899e6485
SHA3-384 hash: 5d37ecd4f54ef9e69c710bac922bfaea4e010af8771071411a3ade844ce612934877bcb0e2a10ff0253f16cb3690575d
SHA1 hash: 569d88a53da650cc92e857ec645c8026ae8c827a
MD5 hash: 0d05bbad0f4cf1699419505764a2438c
humanhash: football-fifteen-asparagus-mississippi
File name:nlte.sh
Download: download sample
Signature Mirai
File size:160 bytes
First seen:2025-12-21 15:13:58 UTC
Last seen:Never
File type: sh
MIME type:text/plain
ssdeep 3:LMFdVZVb8NBzSa+ANjaxE6cCgMFdVZVCONBzSabAp9CE:LMFdVbkPjkEZCgMFdVxJApwE
TLSH T15CC012EF20245585D0096E202075B4189542C58227700F0A9EC92067A48DA107708E21
Magika html
Reporter abuse_ch
Tags:sh
URLMalware sample (SHA256 hash)SignatureTags
http://130.12.180.64/splmipsdcb690747a11527c5ad9919521ffd27a29563f24c19df3d7f9218fdea6e88622 Miraielf mirai ua-wget
http://130.12.180.64/splmpsl0cffd5f3473dde6aecb03030cb95efa81c7e1a1bc218528dc318348af422c8cc Miraielf mirai ua-wget

Intelligence


File Origin
# of uploads :
1
# of downloads :
38
Origin country :
DE DE
Vendor Threat Intelligence
No detections
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
mirai
Verdict:
Malicious
File Type:
text
First seen:
2025-12-21T12:37:00Z UTC
Last seen:
2025-12-22T23:34:00Z UTC
Hits:
~10
Status:
terminated
Behavior Graph:
%3 guuid=53fb96ee-1a00-0000-c1ba-39aebd0c0000 pid=3261 /usr/bin/sudo guuid=a03b8ff1-1a00-0000-c1ba-39aec40c0000 pid=3268 /tmp/sample.bin guuid=53fb96ee-1a00-0000-c1ba-39aebd0c0000 pid=3261->guuid=a03b8ff1-1a00-0000-c1ba-39aec40c0000 pid=3268 execve guuid=2f18f2f1-1a00-0000-c1ba-39aec60c0000 pid=3270 /usr/bin/wget net send-data write-file guuid=a03b8ff1-1a00-0000-c1ba-39aec40c0000 pid=3268->guuid=2f18f2f1-1a00-0000-c1ba-39aec60c0000 pid=3270 execve guuid=f2a996f8-1a00-0000-c1ba-39aed90c0000 pid=3289 /usr/bin/chmod guuid=a03b8ff1-1a00-0000-c1ba-39aec40c0000 pid=3268->guuid=f2a996f8-1a00-0000-c1ba-39aed90c0000 pid=3289 execve guuid=0e7ad6f8-1a00-0000-c1ba-39aeda0c0000 pid=3290 /usr/bin/dash guuid=a03b8ff1-1a00-0000-c1ba-39aec40c0000 pid=3268->guuid=0e7ad6f8-1a00-0000-c1ba-39aeda0c0000 pid=3290 clone guuid=5ac764f9-1a00-0000-c1ba-39aede0c0000 pid=3294 /usr/bin/wget net send-data write-file guuid=a03b8ff1-1a00-0000-c1ba-39aec40c0000 pid=3268->guuid=5ac764f9-1a00-0000-c1ba-39aede0c0000 pid=3294 execve guuid=b493c6fd-1a00-0000-c1ba-39aee60c0000 pid=3302 /usr/bin/chmod guuid=a03b8ff1-1a00-0000-c1ba-39aec40c0000 pid=3268->guuid=b493c6fd-1a00-0000-c1ba-39aee60c0000 pid=3302 execve guuid=41b907fe-1a00-0000-c1ba-39aee70c0000 pid=3303 /usr/bin/dash guuid=a03b8ff1-1a00-0000-c1ba-39aec40c0000 pid=3268->guuid=41b907fe-1a00-0000-c1ba-39aee70c0000 pid=3303 clone f22fee75-ab34-540d-95fe-696883c6f4ad 130.12.180.64:80 guuid=2f18f2f1-1a00-0000-c1ba-39aec60c0000 pid=3270->f22fee75-ab34-540d-95fe-696883c6f4ad send: 135B guuid=5ac764f9-1a00-0000-c1ba-39aede0c0000 pid=3294->f22fee75-ab34-540d-95fe-696883c6f4ad send: 135B
Threat name:
Script-Shell.Downloader.Heuristic
Status:
Malicious
First seen:
2025-12-21 15:16:31 UTC
File Type:
Text (Shell)
AV detection:
3 of 24 (12.50%)
Threat level:
  2/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Modifies registry class
Suspicious use of SetWindowsHookEx
Enumerates physical storage devices
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh 36410af75071ed0d2d90a37243b317c8e0ab142a97dab3806e565013899e6485

(this sample)

  
Delivery method
Distributed via web download

Comments