MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 4a95f15104d8b412809431cae6a164aed67ea70f7faa3c9ffcbb4b42d5c214bd. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: 4a95f15104d8b412809431cae6a164aed67ea70f7faa3c9ffcbb4b42d5c214bd
SHA3-384 hash: ae8c497c032076cb4d40b1129aa8cbb8c677b49364e5b412d7e6399fdb28441dd65552a88a57f28e3c9bc6928e48720f
SHA1 hash: 5d225ba9ca83e15a7818e2abcf4c6ad86601d6c3
MD5 hash: c3a16fae01e37148fb4a818a06862dfa
humanhash: angel-illinois-lamp-virginia
File name:toto
Download: download sample
Signature Mirai
File size:1'213 bytes
First seen:2025-09-23 04:50:53 UTC
Last seen:Never
File type: sh
MIME type:text/plain
ssdeep 24:HftnuftmfnGZqM0RAM0RRPiM0RE6SM0RDaM0RL:H1nu1m/GZqxRAxRExRmxRGxRL
TLSH T1E9219DEF6245B2F09E9CE0826EAFC11970121CC724C0DEAEF85D4C223D48994B474E4C
Magika txt
Reporter abuse_ch
Tags:mirai sh
URLMalware sample (SHA256 hash)SignatureTags
http://160.250.134.61/mips8e8239ebc8b41e0cb7f7452f6293f5a5dd4d2f7bd706df0f9e399413e8df328b Gafgytelf gafgyt geofenced mips ua-wget USA
http://160.250.134.61/mpslaea8ad044799f08ef2a9d6bf1617de28d4669ba1fea99f308550af3c87b70349 Gafgytelf gafgyt geofenced mips mirai ua-wget USA
http://160.250.134.61/arm86c913791bb43de279ba0ecacbe54a5ba85bfbc96a23824ff9c6fd6644f7def7 Miraiarm elf geofenced mirai ua-wget USA
http://160.250.134.61/arm50841551fe33de70d71ebe9a6b62bc95ab0b532eff3e22b642d1d070055f45c3c Miraiarm elf geofenced mirai ua-wget USA
http://160.250.134.61/arm7dd42fda90826e3f259b46e9817c9449571a35a4fe6a067440adc8051c250dfa5 Miraiarm elf geofenced mirai ua-wget USA

Intelligence


File Origin
# of uploads :
1
# of downloads :
40
Origin country :
DE DE
Vendor Threat Intelligence
Verdict:
Malicious
File Type:
text
First seen:
2025-09-23T05:18:00Z UTC
Last seen:
2025-09-23T05:18:00Z UTC
Hits:
~10
Status:
terminated
Behavior Graph:
%3 guuid=e05798ec-1a00-0000-0ee6-75a0d10a0000 pid=2769 /usr/bin/sudo guuid=dde54cef-1a00-0000-0ee6-75a0d60a0000 pid=2774 /tmp/sample.bin guuid=e05798ec-1a00-0000-0ee6-75a0d10a0000 pid=2769->guuid=dde54cef-1a00-0000-0ee6-75a0d60a0000 pid=2774 execve guuid=fdd288ef-1a00-0000-0ee6-75a0d70a0000 pid=2775 /usr/bin/busybox guuid=dde54cef-1a00-0000-0ee6-75a0d60a0000 pid=2774->guuid=fdd288ef-1a00-0000-0ee6-75a0d70a0000 pid=2775 execve guuid=d617faef-1a00-0000-0ee6-75a0d90a0000 pid=2777 /usr/bin/busybox guuid=dde54cef-1a00-0000-0ee6-75a0d60a0000 pid=2774->guuid=d617faef-1a00-0000-0ee6-75a0d90a0000 pid=2777 execve guuid=b78b1df0-1a00-0000-0ee6-75a0da0a0000 pid=2778 /usr/bin/busybox guuid=dde54cef-1a00-0000-0ee6-75a0d60a0000 pid=2774->guuid=b78b1df0-1a00-0000-0ee6-75a0da0a0000 pid=2778 execve guuid=a147c5f0-1a00-0000-0ee6-75a0dd0a0000 pid=2781 /usr/bin/busybox guuid=dde54cef-1a00-0000-0ee6-75a0d60a0000 pid=2774->guuid=a147c5f0-1a00-0000-0ee6-75a0dd0a0000 pid=2781 execve guuid=4d90f1f0-1a00-0000-0ee6-75a0df0a0000 pid=2783 /usr/bin/cp guuid=dde54cef-1a00-0000-0ee6-75a0d60a0000 pid=2774->guuid=4d90f1f0-1a00-0000-0ee6-75a0df0a0000 pid=2783 execve guuid=13720af8-1a00-0000-0ee6-75a0e80a0000 pid=2792 /usr/bin/dash guuid=dde54cef-1a00-0000-0ee6-75a0d60a0000 pid=2774->guuid=13720af8-1a00-0000-0ee6-75a0e80a0000 pid=2792 clone guuid=cb2b733b-1b00-0000-0ee6-75a05c0b0000 pid=2908 /usr/bin/chmod guuid=dde54cef-1a00-0000-0ee6-75a0d60a0000 pid=2774->guuid=cb2b733b-1b00-0000-0ee6-75a05c0b0000 pid=2908 execve guuid=4875e63b-1b00-0000-0ee6-75a05d0b0000 pid=2909 /usr/bin/dash guuid=dde54cef-1a00-0000-0ee6-75a0d60a0000 pid=2774->guuid=4875e63b-1b00-0000-0ee6-75a05d0b0000 pid=2909 clone guuid=5ed7993c-1b00-0000-0ee6-75a0610b0000 pid=2913 /usr/bin/rm delete-file guuid=dde54cef-1a00-0000-0ee6-75a0d60a0000 pid=2774->guuid=5ed7993c-1b00-0000-0ee6-75a0610b0000 pid=2913 execve guuid=5ec4e43c-1b00-0000-0ee6-75a0630b0000 pid=2915 /usr/bin/dash guuid=dde54cef-1a00-0000-0ee6-75a0d60a0000 pid=2774->guuid=5ec4e43c-1b00-0000-0ee6-75a0630b0000 pid=2915 clone guuid=6726877f-1b00-0000-0ee6-75a0b90b0000 pid=3001 /usr/bin/chmod guuid=dde54cef-1a00-0000-0ee6-75a0d60a0000 pid=2774->guuid=6726877f-1b00-0000-0ee6-75a0b90b0000 pid=3001 execve guuid=eec2f47f-1b00-0000-0ee6-75a0bb0b0000 pid=3003 /usr/bin/dash guuid=dde54cef-1a00-0000-0ee6-75a0d60a0000 pid=2774->guuid=eec2f47f-1b00-0000-0ee6-75a0bb0b0000 pid=3003 clone guuid=f71f2982-1b00-0000-0ee6-75a0c20b0000 pid=3010 /usr/bin/rm delete-file guuid=dde54cef-1a00-0000-0ee6-75a0d60a0000 pid=2774->guuid=f71f2982-1b00-0000-0ee6-75a0c20b0000 pid=3010 execve guuid=41909182-1b00-0000-0ee6-75a0c40b0000 pid=3012 /usr/bin/dash guuid=dde54cef-1a00-0000-0ee6-75a0d60a0000 pid=2774->guuid=41909182-1b00-0000-0ee6-75a0c40b0000 pid=3012 clone guuid=370221be-1b00-0000-0ee6-75a0500c0000 pid=3152 /usr/bin/chmod guuid=dde54cef-1a00-0000-0ee6-75a0d60a0000 pid=2774->guuid=370221be-1b00-0000-0ee6-75a0500c0000 pid=3152 execve guuid=1a775ebe-1b00-0000-0ee6-75a0520c0000 pid=3154 /usr/bin/dash guuid=dde54cef-1a00-0000-0ee6-75a0d60a0000 pid=2774->guuid=1a775ebe-1b00-0000-0ee6-75a0520c0000 pid=3154 clone guuid=b6f2a2bf-1b00-0000-0ee6-75a0570c0000 pid=3159 /usr/bin/rm delete-file guuid=dde54cef-1a00-0000-0ee6-75a0d60a0000 pid=2774->guuid=b6f2a2bf-1b00-0000-0ee6-75a0570c0000 pid=3159 execve guuid=ddaaf6bf-1b00-0000-0ee6-75a0580c0000 pid=3160 /usr/bin/dash guuid=dde54cef-1a00-0000-0ee6-75a0d60a0000 pid=2774->guuid=ddaaf6bf-1b00-0000-0ee6-75a0580c0000 pid=3160 clone guuid=9b3323fb-1b00-0000-0ee6-75a0ba0c0000 pid=3258 /usr/bin/chmod guuid=dde54cef-1a00-0000-0ee6-75a0d60a0000 pid=2774->guuid=9b3323fb-1b00-0000-0ee6-75a0ba0c0000 pid=3258 execve guuid=4f8c81fb-1b00-0000-0ee6-75a0bb0c0000 pid=3259 /usr/bin/dash guuid=dde54cef-1a00-0000-0ee6-75a0d60a0000 pid=2774->guuid=4f8c81fb-1b00-0000-0ee6-75a0bb0c0000 pid=3259 clone guuid=9f7525fe-1b00-0000-0ee6-75a0bd0c0000 pid=3261 /usr/bin/rm delete-file guuid=dde54cef-1a00-0000-0ee6-75a0d60a0000 pid=2774->guuid=9f7525fe-1b00-0000-0ee6-75a0bd0c0000 pid=3261 execve guuid=27f3ccfe-1b00-0000-0ee6-75a0be0c0000 pid=3262 /usr/bin/dash guuid=dde54cef-1a00-0000-0ee6-75a0d60a0000 pid=2774->guuid=27f3ccfe-1b00-0000-0ee6-75a0be0c0000 pid=3262 clone guuid=23d9f044-1c00-0000-0ee6-75a0020d0000 pid=3330 /usr/bin/chmod guuid=dde54cef-1a00-0000-0ee6-75a0d60a0000 pid=2774->guuid=23d9f044-1c00-0000-0ee6-75a0020d0000 pid=3330 execve guuid=56b99045-1c00-0000-0ee6-75a0030d0000 pid=3331 /usr/bin/dash guuid=dde54cef-1a00-0000-0ee6-75a0d60a0000 pid=2774->guuid=56b99045-1c00-0000-0ee6-75a0030d0000 pid=3331 clone guuid=588e9e46-1c00-0000-0ee6-75a0050d0000 pid=3333 /usr/bin/rm delete-file guuid=dde54cef-1a00-0000-0ee6-75a0d60a0000 pid=2774->guuid=588e9e46-1c00-0000-0ee6-75a0050d0000 pid=3333 execve guuid=12950647-1c00-0000-0ee6-75a0070d0000 pid=3335 /usr/bin/rm delete-file guuid=dde54cef-1a00-0000-0ee6-75a0d60a0000 pid=2774->guuid=12950647-1c00-0000-0ee6-75a0070d0000 pid=3335 execve guuid=023f18f8-1a00-0000-0ee6-75a0e90a0000 pid=2793 /usr/bin/busybox net send-data write-file guuid=13720af8-1a00-0000-0ee6-75a0e80a0000 pid=2792->guuid=023f18f8-1a00-0000-0ee6-75a0e90a0000 pid=2793 execve 0dc21e74-2c96-5836-aca6-ed80e44c888b 160.250.134.61:80 guuid=023f18f8-1a00-0000-0ee6-75a0e90a0000 pid=2793->0dc21e74-2c96-5836-aca6-ed80e44c888b send: 81B guuid=a421ee3c-1b00-0000-0ee6-75a0640b0000 pid=2916 /usr/bin/busybox net send-data write-file guuid=5ec4e43c-1b00-0000-0ee6-75a0630b0000 pid=2915->guuid=a421ee3c-1b00-0000-0ee6-75a0640b0000 pid=2916 execve guuid=a421ee3c-1b00-0000-0ee6-75a0640b0000 pid=2916->0dc21e74-2c96-5836-aca6-ed80e44c888b send: 81B guuid=e596a082-1b00-0000-0ee6-75a0c50b0000 pid=3013 /usr/bin/busybox net send-data write-file guuid=41909182-1b00-0000-0ee6-75a0c40b0000 pid=3012->guuid=e596a082-1b00-0000-0ee6-75a0c50b0000 pid=3013 execve guuid=e596a082-1b00-0000-0ee6-75a0c50b0000 pid=3013->0dc21e74-2c96-5836-aca6-ed80e44c888b send: 80B guuid=625000c0-1b00-0000-0ee6-75a0590c0000 pid=3161 /usr/bin/busybox net send-data write-file guuid=ddaaf6bf-1b00-0000-0ee6-75a0580c0000 pid=3160->guuid=625000c0-1b00-0000-0ee6-75a0590c0000 pid=3161 execve guuid=625000c0-1b00-0000-0ee6-75a0590c0000 pid=3161->0dc21e74-2c96-5836-aca6-ed80e44c888b send: 81B guuid=8f43e6fe-1b00-0000-0ee6-75a0bf0c0000 pid=3263 /usr/bin/busybox net send-data write-file guuid=27f3ccfe-1b00-0000-0ee6-75a0be0c0000 pid=3262->guuid=8f43e6fe-1b00-0000-0ee6-75a0bf0c0000 pid=3263 execve guuid=8f43e6fe-1b00-0000-0ee6-75a0bf0c0000 pid=3263->0dc21e74-2c96-5836-aca6-ed80e44c888b send: 81B
Threat name:
Win32.Trojan.Generic
Status:
Suspicious
First seen:
2025-09-23 04:33:02 UTC
File Type:
Text (Shell)
AV detection:
9 of 37 (24.32%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Modifies registry class
Suspicious use of SetWindowsHookEx
Enumerates physical storage devices
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh 4a95f15104d8b412809431cae6a164aed67ea70f7faa3c9ffcbb4b42d5c214bd

(this sample)

  
Delivery method
Distributed via web download

Comments