MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 6d6ada003467900f142a538c15301801ec4449ead2e2ac0495222e6ccbeeedc1. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: 6d6ada003467900f142a538c15301801ec4449ead2e2ac0495222e6ccbeeedc1
SHA3-384 hash: 15d44afeaf9d21e77679b9fac8a7b5c942fb431ca912c9ae78a51de6e7df193f19eeaa39ef5dc0f579e67b7aab3d560a
SHA1 hash: 840722aca7101bef080dc81a99e70d1e00cd57a0
MD5 hash: fb04039b1724810018f64022d2751ccd
humanhash: bakerloo-texas-moon-yankee
File name:phy.sh
Download: download sample
Signature Mirai
File size:154 bytes
First seen:2025-12-21 15:13:59 UTC
Last seen:2025-12-21 16:00:56 UTC
File type: sh
MIME type:text/plain
ssdeep 3:LMFdVZVb8NBzSa+ANjavjMFdVZVCONBzSa5Ap92:LMFdVbkPj6jMFdVxyc
TLSH T115C08CEF20252642C00C6E1820A1B819E282C2C227B00B0A9FCC2023F8CF600BB0CE60
Magika html
Reporter abuse_ch
Tags:sh
URLMalware sample (SHA256 hash)SignatureTags
http://130.12.180.64/splmips4a3b75e3f968337924dfc92ac11b62ec56ce5fd449e0e0d3e3dfd50273c9d3d6 Miraielf mirai ua-wget
http://130.12.180.64/splmpsl5a8d30683a937ecf56f6e06cf1f9eb7c9de187e68b4ba1d214eae22a5f1e5bec Miraielf mirai ua-wget

Intelligence


File Origin
# of uploads :
2
# of downloads :
44
Origin country :
DE DE
Vendor Threat Intelligence
No detections
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
mirai
Verdict:
Malicious
File Type:
text
First seen:
2025-12-21T12:37:00Z UTC
Last seen:
2025-12-22T16:17:00Z UTC
Hits:
~10
Status:
terminated
Behavior Graph:
%3 guuid=8f1f314f-1800-0000-0c57-861e150d0000 pid=3349 /usr/bin/sudo guuid=57d17251-1800-0000-0c57-861e180d0000 pid=3352 /tmp/sample.bin guuid=8f1f314f-1800-0000-0c57-861e150d0000 pid=3349->guuid=57d17251-1800-0000-0c57-861e180d0000 pid=3352 execve guuid=7120a651-1800-0000-0c57-861e190d0000 pid=3353 /usr/bin/wget net send-data write-file guuid=57d17251-1800-0000-0c57-861e180d0000 pid=3352->guuid=7120a651-1800-0000-0c57-861e190d0000 pid=3353 execve guuid=22e37c57-1800-0000-0c57-861e210d0000 pid=3361 /usr/bin/chmod guuid=57d17251-1800-0000-0c57-861e180d0000 pid=3352->guuid=22e37c57-1800-0000-0c57-861e210d0000 pid=3361 execve guuid=4e28d657-1800-0000-0c57-861e230d0000 pid=3363 /usr/bin/dash guuid=57d17251-1800-0000-0c57-861e180d0000 pid=3352->guuid=4e28d657-1800-0000-0c57-861e230d0000 pid=3363 clone guuid=f6f0a358-1800-0000-0c57-861e260d0000 pid=3366 /usr/bin/wget net send-data write-file guuid=57d17251-1800-0000-0c57-861e180d0000 pid=3352->guuid=f6f0a358-1800-0000-0c57-861e260d0000 pid=3366 execve guuid=79bf695d-1800-0000-0c57-861e330d0000 pid=3379 /usr/bin/chmod guuid=57d17251-1800-0000-0c57-861e180d0000 pid=3352->guuid=79bf695d-1800-0000-0c57-861e330d0000 pid=3379 execve guuid=5c5db35d-1800-0000-0c57-861e350d0000 pid=3381 /usr/bin/dash guuid=57d17251-1800-0000-0c57-861e180d0000 pid=3352->guuid=5c5db35d-1800-0000-0c57-861e350d0000 pid=3381 clone f22fee75-ab34-540d-95fe-696883c6f4ad 130.12.180.64:80 guuid=7120a651-1800-0000-0c57-861e190d0000 pid=3353->f22fee75-ab34-540d-95fe-696883c6f4ad send: 135B guuid=f6f0a358-1800-0000-0c57-861e260d0000 pid=3366->f22fee75-ab34-540d-95fe-696883c6f4ad send: 135B
Threat name:
Script-Shell.Downloader.Heuristic
Status:
Malicious
First seen:
2025-12-21 15:17:28 UTC
File Type:
Text (Shell)
AV detection:
3 of 24 (12.50%)
Threat level:
  2/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Modifies registry class
Suspicious use of SetWindowsHookEx
Enumerates physical storage devices
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh 6d6ada003467900f142a538c15301801ec4449ead2e2ac0495222e6ccbeeedc1

(this sample)

  
Delivery method
Distributed via web download

Comments