MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 700b319ef583013623e047816b27bcdd4a9ce876ed3bb384a6930206f91eb0fd. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: 700b319ef583013623e047816b27bcdd4a9ce876ed3bb384a6930206f91eb0fd
SHA3-384 hash: 6d6796b84c324d81c399de235556c00b592e212e38780b4199acdb457be9a3008588fbe1f3cd17de86f3e9b8389d8a0e
SHA1 hash: 8571cc872cc4e03e14905dee081dfd629bf4fc4f
MD5 hash: 7276748e6e65fd7d987867f13b6badcb
humanhash: muppet-cola-oven-nine
File name:adi
Download: download sample
Signature Mirai
File size:196 bytes
First seen:2025-12-21 15:14:00 UTC
Last seen:Never
File type: sh
MIME type:text/plain
ssdeep 6:L6CeAKTj7KD6AWJeAbJTobJ+0TPATVWJv:ezAMndzMAewUh
TLSH T1C7D0C99E5101A9B0744FB9FC32B223CA31C2CB0E34750A2ECD8010B3C0C054CE618A1C
Magika shell
Reporter abuse_ch
Tags:sh
URLMalware sample (SHA256 hash)SignatureTags
http://130.12.180.64/zermips04755c04ffac694a8200f1f424c15a9d8824002b8d810da57bc2cc144e3b4089 Miraielf mirai ua-wget
http://130.12.180.64/zermpsl574756f3e9e054d464fee7d6f2b0f299159453b7b75823aa30bb576ac10c6419 Miraielf mirai ua-wget

Intelligence


File Origin
# of uploads :
1
# of downloads :
38
Origin country :
DE DE
Vendor Threat Intelligence
No detections
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
mirai
Verdict:
Malicious
File Type:
text
First seen:
2025-12-21T13:39:00Z UTC
Last seen:
2025-12-22T17:04:00Z UTC
Hits:
~10
Status:
terminated
Behavior Graph:
%3 guuid=71aeaf71-1900-0000-98bf-e6d9c40a0000 pid=2756 /usr/bin/sudo guuid=f3f04c74-1900-0000-98bf-e6d9c50a0000 pid=2757 /tmp/sample.bin guuid=71aeaf71-1900-0000-98bf-e6d9c40a0000 pid=2756->guuid=f3f04c74-1900-0000-98bf-e6d9c50a0000 pid=2757 execve guuid=87a3d974-1900-0000-98bf-e6d9c60a0000 pid=2758 /usr/bin/wget net send-data write-file guuid=f3f04c74-1900-0000-98bf-e6d9c50a0000 pid=2757->guuid=87a3d974-1900-0000-98bf-e6d9c60a0000 pid=2758 execve guuid=f9e9cc7b-1900-0000-98bf-e6d9cf0a0000 pid=2767 /usr/bin/chmod guuid=f3f04c74-1900-0000-98bf-e6d9c50a0000 pid=2757->guuid=f9e9cc7b-1900-0000-98bf-e6d9cf0a0000 pid=2767 execve guuid=142f2b7c-1900-0000-98bf-e6d9d00a0000 pid=2768 /usr/bin/dash guuid=f3f04c74-1900-0000-98bf-e6d9c50a0000 pid=2757->guuid=142f2b7c-1900-0000-98bf-e6d9d00a0000 pid=2768 clone guuid=a1bcea7c-1900-0000-98bf-e6d9d20a0000 pid=2770 /usr/bin/wget net send-data write-file guuid=f3f04c74-1900-0000-98bf-e6d9c50a0000 pid=2757->guuid=a1bcea7c-1900-0000-98bf-e6d9d20a0000 pid=2770 execve guuid=c5a8e280-1900-0000-98bf-e6d9db0a0000 pid=2779 /usr/bin/chmod guuid=f3f04c74-1900-0000-98bf-e6d9c50a0000 pid=2757->guuid=c5a8e280-1900-0000-98bf-e6d9db0a0000 pid=2779 execve guuid=94ba3b81-1900-0000-98bf-e6d9dd0a0000 pid=2781 /usr/bin/dash guuid=f3f04c74-1900-0000-98bf-e6d9c50a0000 pid=2757->guuid=94ba3b81-1900-0000-98bf-e6d9dd0a0000 pid=2781 clone guuid=add6ca82-1900-0000-98bf-e6d9e30a0000 pid=2787 /usr/bin/rm delete-file guuid=f3f04c74-1900-0000-98bf-e6d9c50a0000 pid=2757->guuid=add6ca82-1900-0000-98bf-e6d9e30a0000 pid=2787 execve guuid=b2ca0983-1900-0000-98bf-e6d9e50a0000 pid=2789 /usr/bin/rm delete-file guuid=f3f04c74-1900-0000-98bf-e6d9c50a0000 pid=2757->guuid=b2ca0983-1900-0000-98bf-e6d9e50a0000 pid=2789 execve f22fee75-ab34-540d-95fe-696883c6f4ad 130.12.180.64:80 guuid=87a3d974-1900-0000-98bf-e6d9c60a0000 pid=2758->f22fee75-ab34-540d-95fe-696883c6f4ad send: 135B guuid=a1bcea7c-1900-0000-98bf-e6d9d20a0000 pid=2770->f22fee75-ab34-540d-95fe-696883c6f4ad send: 135B
Threat name:
Script-Shell.Downloader.Heuristic
Status:
Malicious
First seen:
2025-12-21 15:33:23 UTC
File Type:
Text (Shell)
AV detection:
4 of 24 (16.67%)
Threat level:
  2/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Modifies registry class
Suspicious use of SetWindowsHookEx
Enumerates physical storage devices
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh 700b319ef583013623e047816b27bcdd4a9ce876ed3bb384a6930206f91eb0fd

(this sample)

  
Delivery method
Distributed via web download

Comments