MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 4687de1512502430b784010f1d41bba2649b2de3f4544373448d203d2a2e1880. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 4


Intelligence 4 IOCs YARA File information Comments

SHA256 hash: 4687de1512502430b784010f1d41bba2649b2de3f4544373448d203d2a2e1880
SHA3-384 hash: 6c16304b01f99b4de95960d6578eb10681c9798a9fbe7e16cce2f3d5644d18b8f163b3ac193b49206ed0c6063c52df44
SHA1 hash: 1dbd00d49cc8815d93fc285e650323adc03e134f
MD5 hash: b889701096b2ae74fbbe02709820a7d1
humanhash: helium-leopard-october-fix
File name:phi.sh
Download: download sample
Signature Mirai
File size:561 bytes
First seen:2025-02-10 16:41:34 UTC
Last seen:Never
File type: sh
MIME type:text/plain
ssdeep 6:LhE2uXIezghtjTxXd+ihcHmV7thSaLU+BGxX7tyLh4FGNIvLKv7nDhQfiD8dX7vQ:JjeIBt+U4aLBBGfy1NIT6+0
TLSH T14EF044AE41AABF57C46C5E34BA3A7037B031C5C9E1034789FED90478D85D615BE34E81
Magika shell
Reporter abuse_ch
Tags:mirai sh
URLMalware sample (SHA256 hash)SignatureTags
http://94.156.167.35/splmips4fc73b02bd0cc4d44ee8da03ce5ab8b74fb67409fb223c3f36b06dc22dc0dd74 Gafgytelf gafgyt ua-wget
http://94.156.167.35/splmpsl18c99e6db38118a4d50a0bca8dd475f700d3ff172a73fb6a48bdd599d4abae95 Gafgytelf gafgyt ua-wget
http://94.156.167.35/splarm2f66b28645b910c0fcb7a751e9a0dad86fd2be825d07f45dd6ab086ec2eeafc0 Miraielf mirai ua-wget
http://94.156.167.35/splarm50b051fb3621726c4525a268f2bb2c12456cc238b0b301c249feb2872177ae517 Miraielf mirai ua-wget
http://94.156.167.35/splarm6n/an/an/a
http://94.156.167.35/splarm7d2ea0eed1f82458ed76a956ca3fd1f72d1c1e29b40a6118d1e5f1e6d78418077 Miraielf mirai ua-wget

Intelligence


File Origin
# of uploads :
1
# of downloads :
76
Origin country :
DE DE
Vendor Threat Intelligence
Result
Verdict:
UNKNOWN
Threat name:
Linux.Trojan.Generic
Status:
Suspicious
First seen:
2025-02-10 16:42:24 UTC
File Type:
Text (Shell)
AV detection:
15 of 24 (62.50%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
discovery
Behaviour
Modifies registry class
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh 4687de1512502430b784010f1d41bba2649b2de3f4544373448d203d2a2e1880

(this sample)

  
Delivery method
Distributed via web download

Comments