MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 5d7957f2b584fb79725e558f8ebb25f9c8111c2332ab5fe1a93d9dbc62515461. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: 5d7957f2b584fb79725e558f8ebb25f9c8111c2332ab5fe1a93d9dbc62515461
SHA3-384 hash: 257f1e1df887caf7dd623c1ded4d0d56ed161804a6c717dd1db456027d0e8beac6e927ab869c5f30080d459ea9497a0b
SHA1 hash: 597fe899a785e58864f86b0f20c65b174506a76c
MD5 hash: 429f1bb81e56f6bea92830ce10fc382d
humanhash: delta-carbon-september-princess
File name:tp
Download: download sample
Signature Mirai
File size:4'512 bytes
First seen:2025-12-13 07:49:53 UTC
Last seen:2025-12-13 15:15:34 UTC
File type: sh
MIME type:text/plain
ssdeep 96:1xeoNeBeaDeBe9ceHeIHFUIFNIFRFjFBFoF0hioFihiabihi9giniIvoLvaRv960:mT4aC4l+IHFZFCFRFjFBFoF0hiIihiaP
TLSH T1229138CEF5B177330E9ADE1AF216872AF04280D502224F6866C970F8F8FBD4A9D41706
Magika txt
Reporter abuse_ch
Tags:mirai sh
URLMalware sample (SHA256 hash)SignatureTags
http://178.16.52.10/mipsb8efd9fc22ee259562c41a184ae8cf9d9228efbd58a20ccd2074476f63ea3c13 Mirai32-bit elf mirai Mozi
http://178.16.52.10/mpsln/an/an/a
http://178.16.52.10/x86_64n/an/an/a
http://178.16.52.10/arm4n/an/an/a
http://178.16.52.10/arm5n/an/an/a
http://178.16.52.10/arm6n/an/an/a
http://178.16.52.10/arm7n/an/an/a
ftp://8.16.52.10:8021/mipsn/an/an/a
ftp://8.16.52.10:8021/mpsln/an/an/a
ftp://8.16.52.10:8021/arm4n/an/an/a
ftp://8.16.52.10:8021/arm5n/an/an/a
ftp://8.16.52.10:8021/arm7n/an/an/a
ftp://8.16.52.10:8021/arm6n/an/an/a

Intelligence


File Origin
# of uploads :
2
# of downloads :
43
Origin country :
DE DE
Vendor Threat Intelligence
No detections
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
busybox medusa mirai
Verdict:
Malicious
File Type:
text
First seen:
2025-12-13T05:14:00Z UTC
Last seen:
2025-12-13T15:43:00Z UTC
Hits:
~10
Threat name:
Linux.Downloader.Medusa
Status:
Malicious
First seen:
2025-12-13 07:37:37 UTC
File Type:
Text (Shell)
AV detection:
18 of 38 (47.37%)
Threat level:
  3/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Modifies registry class
Suspicious use of SetWindowsHookEx
Enumerates physical storage devices
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh 5d7957f2b584fb79725e558f8ebb25f9c8111c2332ab5fe1a93d9dbc62515461

(this sample)

  
Delivery method
Distributed via web download

Comments