MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 756b6e041316c9bbd85dbf0eb9180b6abc6fa626dd7ec6497d20e6979624d962. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: 756b6e041316c9bbd85dbf0eb9180b6abc6fa626dd7ec6497d20e6979624d962
SHA3-384 hash: c5b1aec2e4f0dbea392d988cbdcbf82d8194eb5bd65e71b02de2792d55e41ff0a3e62c8ca48242b7b186df65bd860016
SHA1 hash: 1b45aa0d4445c41546eb095f0b72a34df2ce803f
MD5 hash: 9972c35ead2006a1dabefc5ce6ae81b4
humanhash: alaska-white-magazine-charlie
File name:camera.sh
Download: download sample
Signature Mirai
File size:388 bytes
First seen:2025-12-21 15:13:33 UTC
Last seen:2025-12-22 10:35:41 UTC
File type: sh
MIME type:text/plain
ssdeep 12:JGmT7m40iXVa7mnkiXVa7m3iXVa7mWiXVn:H7NdXVa7ANXVa7rXVa7OXVn
TLSH T141E092CE03065C9080CDD87937E1E60CB4D05BCE2E771A982D9218BE80F05CE733892A
Magika batch
Reporter abuse_ch
Tags:sh
URLMalware sample (SHA256 hash)SignatureTags
http://130.12.180.64/zerarma46f71b632037aee2b1ae468559467ec5d2787ad04b17873b6450c2b80ac00b7 Miraielf mirai ua-wget
http://130.12.180.64/zerarm5dc4a700f935dd717813708581615f6f11339a75d997b63150f13b53c021e4529 Miraielf mirai ua-wget
http://130.12.180.64/zerarm6052fd5e6d661ad5b1b87783775da7eaf1f1a1b2f6a5f6175e54b6f7aa9925c32 Miraielf mirai ua-wget
http://130.12.180.64/zerarm7bd93f3b53d2702bddb071a835ced4d7e9ba493d72331cd651307ad78da154e74 Miraielf mirai ua-wget

Intelligence


File Origin
# of uploads :
2
# of downloads :
38
Origin country :
DE DE
Vendor Threat Intelligence
No detections
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
evasive mirai
Verdict:
Malicious
File Type:
text
First seen:
2025-12-21T13:44:00Z UTC
Last seen:
2025-12-22T14:15:00Z UTC
Hits:
~10
Status:
terminated
Behavior Graph:
%3 guuid=df13c50b-1900-0000-ec7d-9db127080000 pid=2087 /usr/bin/sudo guuid=62e19a0e-1900-0000-ec7d-9db128080000 pid=2088 /tmp/sample.bin guuid=df13c50b-1900-0000-ec7d-9db127080000 pid=2087->guuid=62e19a0e-1900-0000-ec7d-9db128080000 pid=2088 execve guuid=4881fc0e-1900-0000-ec7d-9db129080000 pid=2089 /usr/bin/rm guuid=62e19a0e-1900-0000-ec7d-9db128080000 pid=2088->guuid=4881fc0e-1900-0000-ec7d-9db129080000 pid=2089 execve guuid=c8586d0f-1900-0000-ec7d-9db12a080000 pid=2090 /usr/bin/wget net send-data write-file guuid=62e19a0e-1900-0000-ec7d-9db128080000 pid=2088->guuid=c8586d0f-1900-0000-ec7d-9db12a080000 pid=2090 execve guuid=2f9f5428-1900-0000-ec7d-9db139080000 pid=2105 /usr/bin/chmod guuid=62e19a0e-1900-0000-ec7d-9db128080000 pid=2088->guuid=2f9f5428-1900-0000-ec7d-9db139080000 pid=2105 execve guuid=eea59028-1900-0000-ec7d-9db13b080000 pid=2107 /usr/bin/dash guuid=62e19a0e-1900-0000-ec7d-9db128080000 pid=2088->guuid=eea59028-1900-0000-ec7d-9db13b080000 pid=2107 clone guuid=704caf28-1900-0000-ec7d-9db13d080000 pid=2109 /usr/bin/rm guuid=62e19a0e-1900-0000-ec7d-9db128080000 pid=2088->guuid=704caf28-1900-0000-ec7d-9db13d080000 pid=2109 execve guuid=18fde528-1900-0000-ec7d-9db13e080000 pid=2110 /usr/bin/rm delete-file guuid=62e19a0e-1900-0000-ec7d-9db128080000 pid=2088->guuid=18fde528-1900-0000-ec7d-9db13e080000 pid=2110 execve guuid=ea2d1e29-1900-0000-ec7d-9db140080000 pid=2112 /usr/bin/wget net send-data write-file guuid=62e19a0e-1900-0000-ec7d-9db128080000 pid=2088->guuid=ea2d1e29-1900-0000-ec7d-9db140080000 pid=2112 execve guuid=a89f362d-1900-0000-ec7d-9db144080000 pid=2116 /usr/bin/chmod guuid=62e19a0e-1900-0000-ec7d-9db128080000 pid=2088->guuid=a89f362d-1900-0000-ec7d-9db144080000 pid=2116 execve guuid=0cbd772d-1900-0000-ec7d-9db145080000 pid=2117 /usr/bin/dash guuid=62e19a0e-1900-0000-ec7d-9db128080000 pid=2088->guuid=0cbd772d-1900-0000-ec7d-9db145080000 pid=2117 clone guuid=409c812d-1900-0000-ec7d-9db146080000 pid=2118 /usr/bin/rm guuid=62e19a0e-1900-0000-ec7d-9db128080000 pid=2088->guuid=409c812d-1900-0000-ec7d-9db146080000 pid=2118 execve guuid=7bf9bb2d-1900-0000-ec7d-9db147080000 pid=2119 /usr/bin/rm delete-file guuid=62e19a0e-1900-0000-ec7d-9db128080000 pid=2088->guuid=7bf9bb2d-1900-0000-ec7d-9db147080000 pid=2119 execve guuid=3536582e-1900-0000-ec7d-9db148080000 pid=2120 /usr/bin/wget net send-data write-file guuid=62e19a0e-1900-0000-ec7d-9db128080000 pid=2088->guuid=3536582e-1900-0000-ec7d-9db148080000 pid=2120 execve guuid=5a223432-1900-0000-ec7d-9db149080000 pid=2121 /usr/bin/chmod guuid=62e19a0e-1900-0000-ec7d-9db128080000 pid=2088->guuid=5a223432-1900-0000-ec7d-9db149080000 pid=2121 execve guuid=ff81ca32-1900-0000-ec7d-9db14a080000 pid=2122 /usr/bin/dash guuid=62e19a0e-1900-0000-ec7d-9db128080000 pid=2088->guuid=ff81ca32-1900-0000-ec7d-9db14a080000 pid=2122 clone guuid=577ce032-1900-0000-ec7d-9db14b080000 pid=2123 /usr/bin/rm guuid=62e19a0e-1900-0000-ec7d-9db128080000 pid=2088->guuid=577ce032-1900-0000-ec7d-9db14b080000 pid=2123 execve guuid=47378433-1900-0000-ec7d-9db14d080000 pid=2125 /usr/bin/rm delete-file guuid=62e19a0e-1900-0000-ec7d-9db128080000 pid=2088->guuid=47378433-1900-0000-ec7d-9db14d080000 pid=2125 execve guuid=37472034-1900-0000-ec7d-9db150080000 pid=2128 /usr/bin/wget net send-data write-file guuid=62e19a0e-1900-0000-ec7d-9db128080000 pid=2088->guuid=37472034-1900-0000-ec7d-9db150080000 pid=2128 execve guuid=b926f838-1900-0000-ec7d-9db15b080000 pid=2139 /usr/bin/chmod guuid=62e19a0e-1900-0000-ec7d-9db128080000 pid=2088->guuid=b926f838-1900-0000-ec7d-9db15b080000 pid=2139 execve guuid=84c56739-1900-0000-ec7d-9db15d080000 pid=2141 /usr/bin/dash guuid=62e19a0e-1900-0000-ec7d-9db128080000 pid=2088->guuid=84c56739-1900-0000-ec7d-9db15d080000 pid=2141 clone guuid=0ed57339-1900-0000-ec7d-9db15e080000 pid=2142 /usr/bin/rm delete-file guuid=62e19a0e-1900-0000-ec7d-9db128080000 pid=2088->guuid=0ed57339-1900-0000-ec7d-9db15e080000 pid=2142 execve f22fee75-ab34-540d-95fe-696883c6f4ad 130.12.180.64:80 guuid=c8586d0f-1900-0000-ec7d-9db12a080000 pid=2090->f22fee75-ab34-540d-95fe-696883c6f4ad send: 134B guuid=ea2d1e29-1900-0000-ec7d-9db140080000 pid=2112->f22fee75-ab34-540d-95fe-696883c6f4ad send: 135B guuid=3536582e-1900-0000-ec7d-9db148080000 pid=2120->f22fee75-ab34-540d-95fe-696883c6f4ad send: 135B guuid=37472034-1900-0000-ec7d-9db150080000 pid=2128->f22fee75-ab34-540d-95fe-696883c6f4ad send: 135B
Threat name:
Win32.Trojan.Vigorf
Status:
Malicious
First seen:
2025-12-21 15:15:43 UTC
File Type:
Text (Shell)
AV detection:
8 of 36 (22.22%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Modifies registry class
Suspicious use of SetWindowsHookEx
Enumerates physical storage devices
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh 756b6e041316c9bbd85dbf0eb9180b6abc6fa626dd7ec6497d20e6979624d962

(this sample)

  
Delivery method
Distributed via web download

Comments