MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 6fa83b7d71aee5de0369f74ec52d7e0e5a293fef5e6993e937fd750ecb844693. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: 6fa83b7d71aee5de0369f74ec52d7e0e5a293fef5e6993e937fd750ecb844693
SHA3-384 hash: ce9d65ed7348e2669f8c644a2ad1f1b8e3a80e2d8623bdd365a1ac50bc170759a7b1ad885c96c26911fb4f21ed837d14
SHA1 hash: a0a8c992c19370287e11d9fcbd5399c20a23df3b
MD5 hash: 4dace31eb831167eb8adbae503651780
humanhash: ink-football-video-comet
File name:e
Download: download sample
Signature Mirai
File size:4'856 bytes
First seen:2025-12-13 07:49:56 UTC
Last seen:Never
File type: sh
MIME type:text/plain
ssdeep 96:1xeEepe1geleZce3eHXczUb57idgi4i5i1MiNiZgi3iHX6CX1+jZ6lHXGOAWg2wr:mjw1XUZuHXczUb57idgi4i5i1MiNiOib
TLSH T1B2A1F5CDB9A133B38ED4DD19F266952FB04690D081219FB4B6CDB0FD74EBD48AA00B15
Magika shell
Reporter abuse_ch
Tags:mirai sh
URLMalware sample (SHA256 hash)SignatureTags
http://178.16.52.10/z/89/mipsb8efd9fc22ee259562c41a184ae8cf9d9228efbd58a20ccd2074476f63ea3c13 Mirai32-bit elf mirai Mozi
http://178.16.52.10/z/89/mpsln/an/an/a
http://178.16.52.10/z/89/x86_64n/an/an/a
http://178.16.52.10/z/89/arm4n/an/an/a
http://178.16.52.10/z/89/arm557c4be7164bd6838fd423f289cfa9ca76f77eae52db1cadac80b0ee2628f99c8 Miraiarm elf geofenced mirai ua-wget USA
http://178.16.52.10/z/89/arm6n/an/an/a
http://178.16.52.10/z/89/arm7n/an/an/a

Intelligence


File Origin
# of uploads :
1
# of downloads :
45
Origin country :
DE DE
Vendor Threat Intelligence
No detections
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
busybox medusa mirai
Verdict:
Malicious
File Type:
text
First seen:
2025-12-13T06:14:00Z UTC
Last seen:
2025-12-14T12:00:00Z UTC
Hits:
~10
Threat name:
Linux.Downloader.Medusa
Status:
Malicious
First seen:
2025-12-13 07:38:20 UTC
File Type:
Text (Shell)
AV detection:
18 of 38 (47.37%)
Threat level:
  3/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Modifies registry class
Suspicious use of SetWindowsHookEx
Enumerates physical storage devices
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh 6fa83b7d71aee5de0369f74ec52d7e0e5a293fef5e6993e937fd750ecb844693

(this sample)

  
Delivery method
Distributed via web download

Comments