MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 71c4953e4706815364a9d7554661f5406f6e2b3132799b9f3896b94726e84e4b. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 5


Intelligence 5 IOCs YARA File information Comments

SHA256 hash: 71c4953e4706815364a9d7554661f5406f6e2b3132799b9f3896b94726e84e4b
SHA3-384 hash: fe41a08502494184cb466126a130d4a0574763f452dcf85ed4d065bdc161de07d5b01e161846c16225f4ba7ac2467e0e
SHA1 hash: 3262859a8898e6a3b2e2abc5c0890c7fbca93e95
MD5 hash: baace96de0ca903dfc1e362eb95608bc
humanhash: mississippi-texas-glucose-nine
File name:phi.sh
Download: download sample
Signature Mirai
File size:574 bytes
First seen:2025-03-07 02:56:44 UTC
Last seen:Never
File type: sh
MIME type:text/plain
ssdeep 12:afWUj2etfWAkT+rfWVGfWRaLBHTyafW2NITt9SfWbTW5J:eWUj22WAkCrWVyWRaLBHTyeW2NIp92Wc
TLSH T185F03CAD006AFE43C0ACAE167566F1B7B6308285100B1A0DFED9147DA88C911A274FD9
Magika shell
Reporter abuse_ch
Tags:sh
URLMalware sample (SHA256 hash)SignatureTags
http://176.65.134.5/splmips46894ab0365d99a0bb377497478ebabe75c295d6119ab5dce7c7c1ea90086efa Miraielf mirai
http://176.65.134.5/splmpslf135cf3046be829d6f1b7ef020c5dd9eca385aed561d782f8b4d03220a2a833d Miraielf mirai
http://176.65.134.5/splarm0c173caa930b8d384c6ae942987c9c0f51371f12f585a0e34d3b4e13d89f5b5b Miraielf mirai
http://176.65.134.5/splarm5c7bf13560d86a03a4b2d614105f2f45340652ebaad205c82194af27448b9b8ff Miraielf mirai
http://176.65.134.5/splarm6f2128b77af9e414b09f8427f9b1efee438971b7a99478031cb81eb99df1831e1 Miraielf mirai
http://176.65.134.5/splarm78312daded7f34a6803e7ed28ad921c93020cb2c865d669bb4a528e7a9c94ee01 Miraielf mirai

Intelligence


File Origin
# of uploads :
1
# of downloads :
110
Origin country :
DE DE
Vendor Threat Intelligence
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
bash evasive lolbin
Result
Verdict:
UNKNOWN
Threat name:
Linux.Trojan.Generic
Status:
Suspicious
First seen:
2025-03-07 02:57:20 UTC
File Type:
Text (Shell)
AV detection:
13 of 38 (34.21%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
discovery
Behaviour
Modifies registry class
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh 71c4953e4706815364a9d7554661f5406f6e2b3132799b9f3896b94726e84e4b

(this sample)

  
Delivery method
Distributed via web download

Comments