MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 3c58d3b08e667a76cb3344bc43c52e8a30c2abba4286bd6fcabc8991fd019661. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: 3c58d3b08e667a76cb3344bc43c52e8a30c2abba4286bd6fcabc8991fd019661
SHA3-384 hash: 8b40b22ed0b062e77e7508d0018854ffef9f5ff0313a2f36ab9f6dfb588f187ebe36b7d53c88a0e24076d16f0cc38714
SHA1 hash: 5c6e73825889359d1a57d4a0a7c2c235067ce1b3
MD5 hash: 86ee521b3102015665c14fe86b8352ea
humanhash: twenty-carpet-william-ink
File name:wget.sh
Download: download sample
Signature Mirai
File size:3'878 bytes
First seen:2025-03-27 21:08:29 UTC
Last seen:Never
File type: sh
MIME type:text/plain
ssdeep 48:1tL5BL9mLlGLJYqLYDLTIh4NfRL2NV51NBUx0FYg8H/aG9hYEkGg4bCReB8VTVYI:1xTqqecyTS5PSyigK/eR1W2TFv
TLSH T1F081468D3A610FB34D25DF1EFA3181B6A147A0A501A04F74F4BDB1FCB9BEE54A21158B
Magika shell
Reporter abuse_ch
Tags:sh
URLMalware sample (SHA256 hash)SignatureTags
http://45.87.43.37/mipsd0a8950232e943e951c209a7ac06f99d76b59839b11ac5b0678ab5667a4c245b Miraimirai ua-wget
http://45.87.43.37/mpsl994cd87c6f0f7edd7efcc88aa5d5ee7b21f2c273cbe8c887363e28f7727a1166 Gafgytgafgyt mirai ua-wget
http://45.87.43.37/arm153a8a2ddd3d18b9a864a7360b8514ceac65ae64ee4e0f058e9ec361ae91d732 Miraielf mirai
http://45.87.43.37/arm572eb6026c66c96d050f30a3da54cb3c85fad70f9f5b805ea8cf543835ab38dcd Gafgytelf gafgyt mirai
http://45.87.43.37/arm6ebfbcbe0c33d53b3f5b5f5e4ac1ec5a8f858ed2aef69c141437e202e3cac75ae Gafgytgafgyt mirai ua-wget
http://45.87.43.37/arm75c0cefe3a02543464efb9a60941a8c28b9359b8d715dcf0c3a9c9094b27d3764 Miraielf mirai
ftp://5.87.43.37:8021/mipsn/an/an/a
ftp://5.87.43.37:8021/mpsln/an/an/a
ftp://5.87.43.37:8021/armn/an/an/a
ftp://5.87.43.37:8021/arm5n/an/an/a
ftp://5.87.43.37:8021/arm7n/an/an/a
ftp://5.87.43.37:8021/arm6n/an/an/a

Intelligence


File Origin
# of uploads :
1
# of downloads :
64
Origin country :
DE DE
Vendor Threat Intelligence
Gathering data
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
busybox evasive
Result
Verdict:
MALICIOUS
Threat name:
Script-Shell.Downloader.Medusa
Status:
Malicious
First seen:
2025-03-27 21:09:18 UTC
File Type:
Text (Shell)
AV detection:
10 of 24 (41.67%)
Threat level:
  3/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
discovery
Behaviour
Modifies registry class
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh 3c58d3b08e667a76cb3344bc43c52e8a30c2abba4286bd6fcabc8991fd019661

(this sample)

  
Delivery method
Distributed via web download

Comments