MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 50e4a4c70cb3355c4bfff4b0768a5c9062292d2acab802fa00c66a457f99ce24. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 9


Intelligence 9 IOCs YARA File information Comments

SHA256 hash: 50e4a4c70cb3355c4bfff4b0768a5c9062292d2acab802fa00c66a457f99ce24
SHA3-384 hash: 5a741a46f43ed8b9bf743b02ef36bd627fe2b4a905967bf8eb336532d5ae852ea67827768e6a5225c17108ca10042608
SHA1 hash: 1c1eabcb17cf273fcb0b3aa77e9667c0777ba1dd
MD5 hash: ab2b57200068848b55520ede11534951
humanhash: alabama-saturn-single-uncle
File name:bo
Download: download sample
Signature Mirai
File size:471 bytes
First seen:2025-01-10 10:52:20 UTC
Last seen:Never
File type: sh
MIME type:text/plain
ssdeep 6:LMFF5CBDxWcMFF5CXM49HfVcMFF5CHLgMFF5CRfI8/MFF5CoCNmVMFF5CTNjpAIz:oqjWDqXT9HfFqHLHqKqqKqTNF/
TLSH T1F2F08CDF127BA714C0876D2D71A2CFA4B155D6C813860F9ABDF85636C4CCA207434B88
Magika shell
Reporter abuse_ch
Tags:mirai sh
URLMalware sample (SHA256 hash)SignatureTags
http://103.136.41.100/12bac0343b8cf8a210de3ebf552587890aabfc5cecc3906c6048ecc087b17f4570 Miraielf mirai ua-wget
http://103.136.41.100/25e5b205976b03a708da3dd55172bbd71ea8aae872016075f53b452329c484e3e Miraimirai ua-wget
http://103.136.41.100/3dde922a53c0fd584c17a298afd97676438d7755c364d5e909faef5b325986e35 Miraimirai ua-wget
http://103.136.41.100/45b351fbbc59d7b63707fb38f5e3f2e987a1dd6dfbed9452e80a500371b5e4c63 Miraimirai ua-wget
http://103.136.41.100/5e573c446480edbfb49b799a99f817028cf3db6c7127208568af46bdb5cbbb1c2 Miraimirai ua-wget
http://103.136.41.100/66f0bd044c41dfbc1734df26b0df2bc09136b03ed9887d1650ab0befeacd6f197 Miraielf mirai ua-wget

Intelligence


File Origin
# of uploads :
1
# of downloads :
94
Origin country :
DE DE
Vendor Threat Intelligence
Result
Verdict:
MALICIOUS
Threat name:
Linux.Trojan.Medusa
Status:
Malicious
First seen:
2025-01-10 11:04:11 UTC
AV detection:
11 of 24 (45.83%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
discovery
Behaviour
Modifies registry class
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh 50e4a4c70cb3355c4bfff4b0768a5c9062292d2acab802fa00c66a457f99ce24

(this sample)

  
Delivery method
Distributed via web download

Comments