MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 5b6af3be2be4ea4848f96e7638ce11fee29e2dafeadf0a7f720882f3100864f8. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 4


Intelligence 4 IOCs YARA File information Comments

SHA256 hash: 5b6af3be2be4ea4848f96e7638ce11fee29e2dafeadf0a7f720882f3100864f8
SHA3-384 hash: 09c89ae4191aefe50bc3461342654ce872eea585524fbe0dbeefd6ed1d95055a9ca71702140a1c6bfbda411459baeb5e
SHA1 hash: 686cc6ab67ed568ec729644654238ef2c524660d
MD5 hash: 4abdb3a4f2fffb34a99805a997543ebe
humanhash: bakerloo-pizza-sad-mobile
File name:wop
Download: download sample
Signature Mirai
File size:560 bytes
First seen:2025-02-10 16:41:27 UTC
Last seen:Never
File type: sh
MIME type:text/plain
ssdeep 6:LhE2uXIezghtjTxXd+ihcHmV7thSaLU+BGxX7tyLh4FGNIvLKv7nDhQfiD8dX7vj:JjeIBt+U4aLBBGfy1NIT6+/
TLSH T1D5F044AE41AABF57C46C5E34BA3A7037B031C5C9E1034789FED90478D85D615BE34E81
Magika txt
Reporter abuse_ch
Tags:mirai sh
URLMalware sample (SHA256 hash)SignatureTags
http://94.156.167.35/splmips4fc73b02bd0cc4d44ee8da03ce5ab8b74fb67409fb223c3f36b06dc22dc0dd74 Gafgytelf gafgyt ua-wget
http://94.156.167.35/splmpsl18c99e6db38118a4d50a0bca8dd475f700d3ff172a73fb6a48bdd599d4abae95 Gafgytelf gafgyt ua-wget
http://94.156.167.35/splarm2f66b28645b910c0fcb7a751e9a0dad86fd2be825d07f45dd6ab086ec2eeafc0 Miraielf mirai ua-wget
http://94.156.167.35/splarm50b051fb3621726c4525a268f2bb2c12456cc238b0b301c249feb2872177ae517 Miraielf mirai ua-wget
http://94.156.167.35/splarm6n/an/an/a
http://94.156.167.35/splarm7d2ea0eed1f82458ed76a956ca3fd1f72d1c1e29b40a6118d1e5f1e6d78418077 Miraielf mirai ua-wget

Intelligence


File Origin
# of uploads :
1
# of downloads :
64
Origin country :
DE DE
Vendor Threat Intelligence
Result
Verdict:
UNKNOWN
Threat name:
Script.Trojan.Heuristic
Status:
Malicious
First seen:
2025-02-10 17:28:45 UTC
File Type:
Text (Shell)
AV detection:
12 of 24 (50.00%)
Threat level:
  2/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
discovery
Behaviour
Modifies registry class
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
System Location Discovery: System Language Discovery
System Network Configuration Discovery: Internet Connection Discovery
Downloads MZ/PE file
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh 5b6af3be2be4ea4848f96e7638ce11fee29e2dafeadf0a7f720882f3100864f8

(this sample)

  
Delivery method
Distributed via web download

Comments