MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 63ece074e856334a62ca7d73d7580fe9eeeea9fd2014315905ad16e51c2cc419. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: 63ece074e856334a62ca7d73d7580fe9eeeea9fd2014315905ad16e51c2cc419
SHA3-384 hash: bac0b43bd743c84a5073374b03c83677d62e0d8592480ac0f567b6b9eaaccbe68bd4d3af30ef06a29c2978d2fd08c20b
SHA1 hash: e48f73971c9172d92cad2331a9e34b346a0a273e
MD5 hash: 9eb3f49acd13704f2c38e1fb8ed29f76
humanhash: tennis-south-arizona-queen
File name:to
Download: download sample
Signature Mirai
File size:199 bytes
First seen:2025-12-21 15:14:49 UTC
Last seen:2025-12-22 09:07:43 UTC
File type: sh
MIME type:text/plain
ssdeep 6:L6CeAKTjOWV6AWJeAbJTobJl8Ftox8OLJn:ezAMCW4zMAejz
TLSH T1E3D0C98E5002ADF8A06DA9AD73B123CAB2829B0D366A0F5EDD9150B694C2588F618E14
Magika shell
Reporter abuse_ch
Tags:sh
URLMalware sample (SHA256 hash)SignatureTags
http://130.12.180.64/zermips04755c04ffac694a8200f1f424c15a9d8824002b8d810da57bc2cc144e3b4089 Miraielf mirai ua-wget
http://130.12.180.64/zermpsl574756f3e9e054d464fee7d6f2b0f299159453b7b75823aa30bb576ac10c6419 Miraielf mirai ua-wget

Intelligence


File Origin
# of uploads :
2
# of downloads :
38
Origin country :
DE DE
Vendor Threat Intelligence
No detections
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
mirai
Verdict:
Malicious
File Type:
text
First seen:
2025-12-21T12:37:00Z UTC
Last seen:
2025-12-23T00:53:00Z UTC
Hits:
~10
Status:
terminated
Behavior Graph:
%3 guuid=9b1369bd-1600-0000-7f48-78dda90d0000 pid=3497 /usr/bin/sudo guuid=28ac9bbf-1600-0000-7f48-78ddaa0d0000 pid=3498 /tmp/sample.bin guuid=9b1369bd-1600-0000-7f48-78dda90d0000 pid=3497->guuid=28ac9bbf-1600-0000-7f48-78ddaa0d0000 pid=3498 execve guuid=069ee2bf-1600-0000-7f48-78ddab0d0000 pid=3499 /usr/bin/wget net send-data write-file guuid=28ac9bbf-1600-0000-7f48-78ddaa0d0000 pid=3498->guuid=069ee2bf-1600-0000-7f48-78ddab0d0000 pid=3499 execve guuid=42d33dd7-1600-0000-7f48-78ddb90d0000 pid=3513 /usr/bin/chmod guuid=28ac9bbf-1600-0000-7f48-78ddaa0d0000 pid=3498->guuid=42d33dd7-1600-0000-7f48-78ddb90d0000 pid=3513 execve guuid=8e7f81d7-1600-0000-7f48-78ddba0d0000 pid=3514 /usr/bin/dash guuid=28ac9bbf-1600-0000-7f48-78ddaa0d0000 pid=3498->guuid=8e7f81d7-1600-0000-7f48-78ddba0d0000 pid=3514 clone guuid=9eba2fd9-1600-0000-7f48-78ddc20d0000 pid=3522 /usr/bin/wget net send-data write-file guuid=28ac9bbf-1600-0000-7f48-78ddaa0d0000 pid=3498->guuid=9eba2fd9-1600-0000-7f48-78ddc20d0000 pid=3522 execve guuid=55933ddd-1600-0000-7f48-78ddc80d0000 pid=3528 /usr/bin/chmod guuid=28ac9bbf-1600-0000-7f48-78ddaa0d0000 pid=3498->guuid=55933ddd-1600-0000-7f48-78ddc80d0000 pid=3528 execve guuid=153798dd-1600-0000-7f48-78ddc90d0000 pid=3529 /usr/bin/dash guuid=28ac9bbf-1600-0000-7f48-78ddaa0d0000 pid=3498->guuid=153798dd-1600-0000-7f48-78ddc90d0000 pid=3529 clone guuid=58d748de-1600-0000-7f48-78ddcb0d0000 pid=3531 /usr/bin/rm guuid=28ac9bbf-1600-0000-7f48-78ddaa0d0000 pid=3498->guuid=58d748de-1600-0000-7f48-78ddcb0d0000 pid=3531 execve guuid=0c76a2de-1600-0000-7f48-78ddcc0d0000 pid=3532 /usr/bin/rm delete-file guuid=28ac9bbf-1600-0000-7f48-78ddaa0d0000 pid=3498->guuid=0c76a2de-1600-0000-7f48-78ddcc0d0000 pid=3532 execve guuid=80d420df-1600-0000-7f48-78ddcd0d0000 pid=3533 /usr/bin/rm delete-file guuid=28ac9bbf-1600-0000-7f48-78ddaa0d0000 pid=3498->guuid=80d420df-1600-0000-7f48-78ddcd0d0000 pid=3533 execve f22fee75-ab34-540d-95fe-696883c6f4ad 130.12.180.64:80 guuid=069ee2bf-1600-0000-7f48-78ddab0d0000 pid=3499->f22fee75-ab34-540d-95fe-696883c6f4ad send: 135B guuid=9eba2fd9-1600-0000-7f48-78ddc20d0000 pid=3522->f22fee75-ab34-540d-95fe-696883c6f4ad send: 135B
Threat name:
Script-Shell.Downloader.Heuristic
Status:
Malicious
First seen:
2025-12-21 15:38:22 UTC
File Type:
Text (Shell)
AV detection:
4 of 24 (16.67%)
Threat level:
  2/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Modifies registry class
Suspicious use of SetWindowsHookEx
Enumerates physical storage devices
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh 63ece074e856334a62ca7d73d7580fe9eeeea9fd2014315905ad16e51c2cc419

(this sample)

  
Delivery method
Distributed via web download

Comments