MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 653df28c2b81bc8cfa666dcf70b1abb21b24cddb6cba2e7429eec4f9e07fd080. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: 653df28c2b81bc8cfa666dcf70b1abb21b24cddb6cba2e7429eec4f9e07fd080
SHA3-384 hash: 6a054e59659380fea3014553351d9bd0e2a83d3c128bd99fefaff83d50f2b632a37100a3d9de59b3529a480ea9f966b5
SHA1 hash: b1e89da8d60fcb7b20cffdabd67f1703b460da39
MD5 hash: b39526f2ac1c6eb7eefc39b0c08df495
humanhash: romeo-undress-orange-double
File name:b
Download: download sample
Signature Mirai
File size:4'939 bytes
First seen:2025-06-12 14:30:23 UTC
Last seen:2025-08-03 14:44:17 UTC
File type: sh
MIME type:text/plain
ssdeep 48:jLrBLYsL+JdLUGLwYqLLDLaXZU9YxEN0SCJho0UYgXHWXJJAJzYYP1XeeTN48yVr:HZF+zVTcbaXBxOhCrxvgXWXkddXVkZp
TLSH T1DAA1D0893E625A73CE51DF6AE325C52A784680D580608FF524BE30BCBCBFD48EA11567
Magika shell
Reporter abuse_ch
Tags:sh
URLMalware sample (SHA256 hash)SignatureTags
http://196.251.116.9/mipsn/an/aelf ua-wget
http://196.251.116.9/z/89/mpsl342b3027479e52477e392189cfb728f709d705856afa7c9ee7ce2a555b0050d6 Miraielf mirai ua-wget
http://196.251.116.9/z/89/x86_64b711de28c460548a23b75a63e61cfe559c8a3534af1bbb5497cca20ce95ea193 Miraielf mirai ua-wget
http://196.251.116.9/z/89/arm4n/an/aelf ua-wget
http://196.251.116.9/z/89/arm537a352c914d463e97fd51ca4c3a23ef5cd75e853e395239a11bce808e33bf1fd Miraielf mirai ua-wget
http://196.251.116.9/z/89/arm6ab66ba18ba7aef0d63af43ecc2cc8388cc461072bc7d6103ac89704deee8e60d Miraielf mirai ua-wget
http://196.251.116.9/z/89/arm751e83cce6c75d1baf3c7e7ab255c53d3f02f0fe71bb071ce68333c38e98e739e Miraielf mirai ua-wget
http://196.251.116.9/z/89/mips79ab393b5c0b62a5e4272793f0f4e4d42762fe4cd7daa4555fb0b2ddb0dc77ee Miraielf mirai ua-wget

Intelligence


File Origin
# of uploads :
38
# of downloads :
61
Origin country :
DE DE
Vendor Threat Intelligence
Threat name:
Linux.Downloader.Medusa
Status:
Malicious
First seen:
2025-06-12 14:46:53 UTC
File Type:
Text (Shell)
AV detection:
17 of 38 (44.74%)
Threat level:
  3/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Modifies registry class
Suspicious use of SetWindowsHookEx
Enumerates physical storage devices
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh 653df28c2b81bc8cfa666dcf70b1abb21b24cddb6cba2e7429eec4f9e07fd080

(this sample)

  
Delivery method
Distributed via web download

Comments