MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 4adb5acf0f3f375b447184e3a50cf52cfda321bb869df14d7daab9611274aa42. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: 4adb5acf0f3f375b447184e3a50cf52cfda321bb869df14d7daab9611274aa42
SHA3-384 hash: c777567352252a0cd7938c5043d17f5bd9e123422ed2577ad61a9a8619e2e02cddc2ec1b731f4b13aba80d7d7b8538bc
SHA1 hash: 1a6a7d0f9886e3deb00929fb155df29925d3d683
MD5 hash: 3b5e60de3697c492693c10779330e2c8
humanhash: hamper-carpet-india-maine
File name:c.sh
Download: download sample
Signature Mirai
File size:801 bytes
First seen:2025-02-13 20:50:44 UTC
Last seen:Never
File type: sh
MIME type:text/plain
ssdeep 24:3J3qkiLTQNI71IQKagwgEwI2QQD5AFQtXdTlAsPWg30CA:SRP6wmbWYl7WqI
TLSH T1FF01DE9DA8F13A67D6788E08E1758839B012C0D4E6E3DB96E42B18354CD8310BD243FB
Magika txt
Reporter abuse_ch
Tags:sh
URLMalware sample (SHA256 hash)SignatureTags
http://94.156.227.74/armn/an/aelf mirai ua-wget
http://94.156.227.74/arm5n/an/aelf mirai ua-wget
http://94.156.227.74/arm6n/an/aelf mirai ua-wget
http://94.156.227.74/arm7n/an/aelf mirai ua-wget
http://94.156.227.74/m68kn/an/aelf mirai ua-wget
http://94.156.227.74/mipsn/an/a32-bit elf mirai
http://94.156.227.74/mpsln/an/aelf mirai ua-wget
http://94.156.227.74/ppcn/an/aelf mirai ua-wget
http://94.156.227.74/sh4n/an/aelf mirai ua-wget
http://94.156.227.74/spcn/an/aelf mirai ua-wget
http://94.156.227.74/x86n/an/a32-bit elf mirai
http://94.156.227.74/x86_64ece9d7b052f849ced5d511673f5b26cbbeada72939bda86dac84216b054e5b9c Miraielf mirai ua-wget

Intelligence


File Origin
# of uploads :
1
# of downloads :
74
Origin country :
DE DE
Vendor Threat Intelligence
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
lolbin packed remote
Result
Verdict:
UNKNOWN
Threat name:
Win32.Trojan.Generic
Status:
Malicious
First seen:
2025-02-13 20:51:15 UTC
File Type:
Text (Makefile)
AV detection:
9 of 24 (37.50%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
discovery
Behaviour
Modifies registry class
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
System Location Discovery: System Language Discovery
System Network Configuration Discovery: Internet Connection Discovery
Downloads MZ/PE file
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh 4adb5acf0f3f375b447184e3a50cf52cfda321bb869df14d7daab9611274aa42

(this sample)

  
Delivery method
Distributed via web download

Comments