MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 39e3346deebe6f052ccd48e1a2418b1634b26ca000ef1c22bab5825311489940. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 4


Intelligence 4 IOCs YARA File information Comments

SHA256 hash: 39e3346deebe6f052ccd48e1a2418b1634b26ca000ef1c22bab5825311489940
SHA3-384 hash: 5aee1637c7ddd1afedfd1052c56f3279cde7a3a3a6f131d0179a55f7546c5f4e12dd0322cec52795a983933278f8d95b
SHA1 hash: becd361d7c7eebdfee6d5b6473ba374884c105ff
MD5 hash: 9e33a3cf38d4e01f42ddff4efdf10f45
humanhash: river-early-nine-hot
File name:w.sh
Download: download sample
Signature Mirai
File size:931 bytes
First seen:2025-12-01 16:24:06 UTC
Last seen:Never
File type: sh
MIME type:text/plain
ssdeep 12:I3YE1NIl5I0LKmP+ObhjM1T5NSOTtjN2bR:MYE1NI77KK+4jaTrlTtjNOR
TLSH T1AE118FCEB2A125320C81CD7461618E2C943499D535B28F5E9DEC39FAD2D6D24B327EAC
Magika txt
Reporter abuse_ch
Tags:mirai sh

Intelligence


File Origin
# of uploads :
1
# of downloads :
28
Origin country :
DE DE
Vendor Threat Intelligence
No detections
Gathering data
Result
Gathering data
Threat name:
Linux.Worm.Mirai
Status:
Malicious
First seen:
2025-11-28 02:24:22 UTC
File Type:
Text (Shell)
AV detection:
17 of 36 (47.22%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Modifies registry class
Suspicious use of SetWindowsHookEx
Enumerates physical storage devices
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh 39e3346deebe6f052ccd48e1a2418b1634b26ca000ef1c22bab5825311489940

(this sample)

  
Delivery method
Distributed via web download

Comments