MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 37006736b9add213525fb10482753f4369a95e8a51c5166a77dfdab44ab06650. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: 37006736b9add213525fb10482753f4369a95e8a51c5166a77dfdab44ab06650
SHA3-384 hash: 7e87b4722bf5d613630d503f0b6f6ccad9313f978a49772899b204ea562c95589b1ce1e1fad61ae69c75f3a9f71ed4c7
SHA1 hash: 8ea06ea35e85d6a04d9527eb2a6e2cd31a23c46a
MD5 hash: 9ab799fb72c9d12c2fd73fd7d3503417
humanhash: princess-diet-yankee-artist
File name:p
Download: download sample
Signature Mirai
File size:2'641 bytes
First seen:2024-12-25 06:56:03 UTC
Last seen:Never
File type: sh
MIME type:text/plain
ssdeep 48:4k5CEA0GkBE/ZykIgkIEkI0kIUkIMkIQkI0kIakIukIckIEkIukIn:tCEA09BoYkcscGUWq0ES4
TLSH T12E519DCF00D98DA5A894999D3BD30AA8F4C5D5D926C9CBCFF88F1631A8CCA0CF115E59
Magika txt
Reporter abuse_ch
Tags:sh
URLMalware sample (SHA256 hash)SignatureTags
http://154.216.17.112/vv/i686a262c2a7c581c95058ddfd0bcd30c20e856e036d5170f3c625d76e221db6d882 Miraielf mirai
http://154.216.17.112/vv/mipscb1c2397a2408979b855b6269b0e545e137d54096ed46ff0ca6b0d91e24bbf52 Miraielf mirai
http://154.216.17.112/vv/mipsel86ba81725dc4638d6ef969cbfe5ccdf1718f19a636aa60037a456450c7b6ca34 Miraielf mirai
http://154.216.17.112/vv/armv4l2a514e0ab8e84db630747fe9d38e72063d3f7ffe5f9076c73a3f9ff52eb2d6bf Miraielf mirai
http://154.216.17.112/vv/armv5l3d73a5656daaa94feb4ae135f78cfc6341e1de9cc730b28f8fbf91fd315a484d Miraielf mirai
http://154.216.17.112/vv/armv6la7bb217aa33c852b9dcc54067ebe57db77930cddc0d7342d84477bebe2017da2 Miraielf mirai
http://154.216.17.112/vv/armv7l7da3d4805795ca85be0e764d732cead98cd68b6a4ebde6b42cc56bb81979eb20 Miraielf mirai
http://154.216.17.112/vv/superh7da3d4805795ca85be0e764d732cead98cd68b6a4ebde6b42cc56bb81979eb20 Miraielf
http://154.216.17.112/vv/sparc2f3d65e0e55d1973ef61bb8ae6594cb438eb2191e88e48398f2b8aa6b68965f7 Miraielf mirai
http://154.216.17.112/vv/riscv327f517eab4da6fde36b55b5f24e2e3841580315b1d1ff17ac37d9296524677b5c Miraielf mirai
http://154.216.17.112/vv/powerpc084b71368b5b1a31b9e7edb7da480b903188c32a3c431b7607d379c9d34cf0e4 Miraielf mirai
http://154.216.17.112/vv/sh48e8c5bbb9dc1ca65f0cce393493c48d15d4ef471be58178d58d8b06a1b7bb670 Gafgytelf gafgyt
http://154.216.17.112/vv/armv4eb15d8ea986f3cd94808a685c86a4e6666568d805e4134c6973a06fe6f96cdd8e1 Miraielf mirai
http://154.216.17.112/vv/arcf515ddd51f06d6ebfc8ae204a8c47446b9280b911d20a2aa6104ba065b4363e6 Miraielf mirai

Intelligence


File Origin
# of uploads :
1
# of downloads :
80
Origin country :
DE DE
Vendor Threat Intelligence
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
anti-debug
Result
Verdict:
MALICIOUS
Threat name:
Script-Shell.Trojan.Malgent
Status:
Malicious
First seen:
2024-12-25 07:03:45 UTC
File Type:
Text (Shell)
AV detection:
9 of 23 (39.13%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
discovery
Behaviour
Modifies registry class
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh 37006736b9add213525fb10482753f4369a95e8a51c5166a77dfdab44ab06650

(this sample)

  
Delivery method
Distributed via web download

Comments