MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 7721e0c6666165a2c42d79fe7fa5dd0e6d632e03fb66b815315f4decba2f93ea. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 8


Intelligence 8 IOCs YARA 1 File information Comments

SHA256 hash: 7721e0c6666165a2c42d79fe7fa5dd0e6d632e03fb66b815315f4decba2f93ea
SHA3-384 hash: f2511a98a76569e6b023b8635c73b49b3adc6b45b03443a96df4fde238b9f0fdad177a30bdd68005bcf4fca1f3deb1e1
SHA1 hash: d62c971d07bd501ce6d668356e57876c23ec1636
MD5 hash: 644552b3d9109bb411b5887590e1527c
humanhash: pizza-island-beer-cat
File name:weed
Download: download sample
Signature Mirai
File size:4'621 bytes
First seen:2025-02-22 14:26:27 UTC
Last seen:Never
File type: sh
MIME type:text/plain
ssdeep 48:1tLYBLwmLHRdLMGLYYqLjDLEJ/GT58N8UbRhQ0sYgfHorrvRtgY3zmd+on1MwafB:1xGHHLdrcjEa5mrbzZXgfo/jjSKDTFv
TLSH T1409132DD3A610B3A0D11EF17F2A285BD6062E0E114918F18B5ED74FCE5BED44BE2066B
Magika shell
Reporter abuse_ch
Tags:Hailbot sh
URLMalware sample (SHA256 hash)SignatureTags
http://45.125.66.124/mips69955124ad9ed026da5d2595b5ede417fc62713e26146f29e9e0e34573bfcbbe Miraiddos elf mirai
http://45.125.66.124/mpsl9d3f0eff61abc9ea9f4920dda97e7f1384cb21ca3d8029cec27425e4f9d72e31 Miraiddos elf mirai
http://45.125.66.124/x86b898ae5b8e6214e0991fcce236739c41b378181d3bcd4e86e7f6e941e2897c50 Miraiddos elf mirai
http://45.125.66.124/arm4b72e3b340647a4a716f9bc067ff3747f3753a87d11fdc06d5e942f15428533bc Miraiddos elf mirai
http://45.125.66.124/arm5be93b9dbdfcdc052edc8f91bb78563d1f7e49590f79b324ac7443c00d359df4d Miraiddos elf mirai
http://45.125.66.124/arm6b0adbdffa930ebb127e974f7f1189d2c7dcd6d948dce02abdfc3796e302b9890 Miraiddos elf mirai
http://45.125.66.124/arm76a74c0b33864ad3b813d5e48df78049065f8c381a8c3fa470abfb7cb254fc4ba Miraielf mirai ua-wget
ftp://5.125.66.124:8021/mipsn/an/an/a
ftp://5.125.66.124:8021/mpsln/an/an/a
ftp://5.125.66.124:8021/x86n/an/an/a
ftp://5.125.66.124:8021/arm4n/an/an/a
ftp://5.125.66.124:8021/arm5n/an/an/a
ftp://5.125.66.124:8021/arm7n/an/an/a
ftp://5.125.66.124:8021/arm6n/an/an/a

Intelligence


File Origin
# of uploads :
1
# of downloads :
7
Origin country :
US US
Vendor Threat Intelligence
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
busybox
Result
Verdict:
MALICIOUS
Threat name:
Linux.Downloader.Medusa
Status:
Malicious
First seen:
2025-02-22 11:17:46 UTC
File Type:
Text (Shell)
AV detection:
13 of 24 (54.17%)
Threat level:
  3/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
discovery
Behaviour
Modifies registry class
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:ach_202412_sh_hailbot
Author:abuse.ch
Description:Detects HailBot shell scripts

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh 7721e0c6666165a2c42d79fe7fa5dd0e6d632e03fb66b815315f4decba2f93ea

(this sample)

  
Delivery method
Distributed via web download

Comments