MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 631f7d7c73812a4329667cad2570557edf36831a497ceb2d0a760ae61e467eff. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 6


Intelligence 6 IOCs YARA 1 File information Comments

SHA256 hash: 631f7d7c73812a4329667cad2570557edf36831a497ceb2d0a760ae61e467eff
SHA3-384 hash: 3055353783bf745c96603b00fd7fe90767a0bb9612672574dfa95c131bed04c62c35b45837f2a879f329f325221d9b57
SHA1 hash: a8030a2926c284f94f01822a8510195e77a7e140
MD5 hash: 833a72a93b1f935025d4b34056ed4c4e
humanhash: undress-timing-march-floor
File name:bins.sh
Download: download sample
Signature Mirai
File size:533 bytes
First seen:2025-02-25 18:32:53 UTC
Last seen:Never
File type: sh
MIME type:text/plain
ssdeep 6:lOnFflE0FZgQnQX1/i/gQnQX1/ovyCxSgd9QTz9o7CgnHJ9Q4xCTusC9QBm7CeI8:v0F+7XQ47XHCz77D7p9oi
TLSH T1A3F0A484313DD0A4595758C1BA134491F288C47025962DE1ABFFD5D3C84E985BA1FDDD
Magika shell
Reporter abuse_ch
Tags:sh
URLMalware sample (SHA256 hash)SignatureTags
http://107.189.31.150/GuruITDDoS3.shae9bc27d53679248d34adfc5e9e601c1f2fe23b7968fa6a29324a8dfbaa3a746 Miraimirai sh

Intelligence


File Origin
# of uploads :
1
# of downloads :
118
Origin country :
DE DE
Vendor Threat Intelligence
Verdict:
Malicious
Score:
94.9%
Tags:
downloader trojan agent
Result
Verdict:
UNKNOWN
Threat name:
Script-Shell.Trojan.Heuristic
Status:
Malicious
First seen:
2025-02-25 18:33:11 UTC
File Type:
Text (Shell)
AV detection:
6 of 24 (25.00%)
Threat level:
  2/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
discovery
Behaviour
Modifies registry class
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:ach_202412_suspect_bash_script
Author:abuse.ch
Description:Detects suspicious Linux bash scripts

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh 631f7d7c73812a4329667cad2570557edf36831a497ceb2d0a760ae61e467eff

(this sample)

  
Delivery method
Distributed via web download

Comments