MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 4202deb5d2189234aef9c1f27e7b1f262da1541b7e77ab465dddd83c123e656f. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: 4202deb5d2189234aef9c1f27e7b1f262da1541b7e77ab465dddd83c123e656f
SHA3-384 hash: 7a04a90f1e9cdae229ca4c5706e9b32d84f09b0bb9cf4fac1267cffd8d84e4a6575d99053af16a5bc3ab8451c264fef2
SHA1 hash: d089750a800c063ab6ab0bfbd00c3df17a37ce19
MD5 hash: 19c278e844162a32d896a32754346195
humanhash: five-hamper-coffee-fanta
File name:cnipc
Download: download sample
Signature Mirai
File size:154 bytes
First seen:2025-12-05 18:23:15 UTC
Last seen:Never
File type: sh
MIME type:text/plain
ssdeep 3:LxAjtyg/w8NBzSa+ANja9EJzgxAjtyg/pONBzSa5Ap9mun:LA5/wkPjoE9gA5/Mykun
TLSH T10AC04CBD102B6655C110AE21A4657459B273CBD761B18B0A96C87433F58D520F222E55
Magika txt
Reporter abuse_ch
Tags:sh
URLMalware sample (SHA256 hash)SignatureTags
http://213.209.143.64/splmips633397cf2ca1b26757c7f32fe2e980ea66f783becff9455e11ded00b20032417 Miraielf mirai ua-wget
http://213.209.143.64/splmpsl61d0e0c8b1e9fdf341c8bbaacc50fe6cc5c5f73d4b7cb0f80808e6fedbf70d3c Miraielf mirai ua-wget

Intelligence


File Origin
# of uploads :
1
# of downloads :
31
Origin country :
DE DE
Vendor Threat Intelligence
No detections
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
mirai
Verdict:
Malicious
File Type:
text
First seen:
2025-12-05T20:58:00Z UTC
Last seen:
2025-12-05T21:02:00Z UTC
Hits:
~10
Status:
terminated
Behavior Graph:
%3 guuid=7b5c3127-1a00-0000-71be-4ef4e10d0000 pid=3553 /usr/bin/sudo guuid=5ec59229-1a00-0000-71be-4ef4e90d0000 pid=3561 /tmp/sample.bin guuid=7b5c3127-1a00-0000-71be-4ef4e10d0000 pid=3553->guuid=5ec59229-1a00-0000-71be-4ef4e90d0000 pid=3561 execve guuid=4a5cd529-1a00-0000-71be-4ef4ee0d0000 pid=3566 /usr/bin/wget net send-data write-file guuid=5ec59229-1a00-0000-71be-4ef4e90d0000 pid=3561->guuid=4a5cd529-1a00-0000-71be-4ef4ee0d0000 pid=3566 execve guuid=a37f7545-1a00-0000-71be-4ef4fc0d0000 pid=3580 /usr/bin/chmod guuid=5ec59229-1a00-0000-71be-4ef4e90d0000 pid=3561->guuid=a37f7545-1a00-0000-71be-4ef4fc0d0000 pid=3580 execve guuid=dd78e845-1a00-0000-71be-4ef4fd0d0000 pid=3581 /usr/bin/dash guuid=5ec59229-1a00-0000-71be-4ef4e90d0000 pid=3561->guuid=dd78e845-1a00-0000-71be-4ef4fd0d0000 pid=3581 clone guuid=54cb8f46-1a00-0000-71be-4ef4000e0000 pid=3584 /usr/bin/wget net send-data write-file guuid=5ec59229-1a00-0000-71be-4ef4e90d0000 pid=3561->guuid=54cb8f46-1a00-0000-71be-4ef4000e0000 pid=3584 execve guuid=5ce2074b-1a00-0000-71be-4ef40c0e0000 pid=3596 /usr/bin/chmod guuid=5ec59229-1a00-0000-71be-4ef4e90d0000 pid=3561->guuid=5ce2074b-1a00-0000-71be-4ef40c0e0000 pid=3596 execve guuid=fbbb664b-1a00-0000-71be-4ef40e0e0000 pid=3598 /usr/bin/dash guuid=5ec59229-1a00-0000-71be-4ef4e90d0000 pid=3561->guuid=fbbb664b-1a00-0000-71be-4ef40e0e0000 pid=3598 clone b3bc708e-8ccc-5219-9688-8bb7f25e7035 213.209.143.64:80 guuid=4a5cd529-1a00-0000-71be-4ef4ee0d0000 pid=3566->b3bc708e-8ccc-5219-9688-8bb7f25e7035 send: 136B guuid=54cb8f46-1a00-0000-71be-4ef4000e0000 pid=3584->b3bc708e-8ccc-5219-9688-8bb7f25e7035 send: 136B
Threat name:
Script-Shell.Downloader.Heuristic
Status:
Malicious
First seen:
2025-12-05 18:34:22 UTC
File Type:
Text (Shell)
AV detection:
3 of 24 (12.50%)
Threat level:
  2/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Modifies registry class
Suspicious use of SetWindowsHookEx
Enumerates physical storage devices
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh 4202deb5d2189234aef9c1f27e7b1f262da1541b7e77ab465dddd83c123e656f

(this sample)

  
Delivery method
Distributed via web download

Comments