MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 7a0d29462ec9548247fb10a6e2ccf36bcaec52468002ab87a4685cb371963a31. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: 7a0d29462ec9548247fb10a6e2ccf36bcaec52468002ab87a4685cb371963a31
SHA3-384 hash: 338ba8b15ffa5c8975576dc284c8b4050d2db6a323c6d7fce36e0d176fdba7987be9c6b6ed086fdde13078afab30b78f
SHA1 hash: c8244e6c54578a05eb86e7fafd6736d9415b343b
MD5 hash: 386100abfffea6047e4e7d3a350de1a9
humanhash: cold-romeo-nineteen-south
File name:wget.sh
Download: download sample
Signature Mirai
File size:454 bytes
First seen:2025-02-12 04:41:07 UTC
Last seen:2025-02-13 02:00:09 UTC
File type: sh
MIME type:text/plain
ssdeep 6:SuUQA9WC+UQAXUW/+UQAEZW9wdUQMMUVSWtDaUQMoIpWs+UQDSWR:q06XP/lEozMqtDNeLlR
TLSH T1DDF0A29B03E7B0F282B24FA166D648C1E005D3C02CF5139BD8DB8DA7C684662F158E97
Magika txt
Reporter abuse_ch
Tags:sh
URLMalware sample (SHA256 hash)SignatureTags
http://66.63.187.69/arm6n/an/aelf mirai ua-wget
http://66.63.187.69/arm5n/an/aelf mirai ua-wget
http://66.63.187.69/arm7n/an/aelf mirai ua-wget
http://66.63.187.69/mipsn/an/a32-bit elf mirai
http://66.63.187.69/mpsln/an/aelf mirai ua-wget
http://66.63.187.69/x86n/an/a64-bit elf mirai

Intelligence


File Origin
# of uploads :
2
# of downloads :
111
Origin country :
DE DE
Vendor Threat Intelligence
Verdict:
Malicious
Score:
92.5%
Tags:
backdoor trojan agent
Result
Verdict:
UNKNOWN
Threat name:
Document-HTML.Trojan.Heuristic
Status:
Malicious
First seen:
2025-02-12 04:41:16 UTC
File Type:
Text (Shell)
AV detection:
9 of 24 (37.50%)
Threat level:
  2/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
adware discovery persistence privilege_escalation stealer
Behaviour
Modifies Internet Explorer settings
Modifies data under HKEY_USERS
Modifies registry class
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
System policy modification
Uses Task Scheduler COM API
Enumerates physical storage devices
System Location Discovery: System Language Discovery
System Network Configuration Discovery: Internet Connection Discovery
Drops file in Program Files directory
Drops file in System32 directory
Checks installed software on the system
Installs/modifies Browser Helper Object
Event Triggered Execution: Component Object Model Hijacking
Executes dropped EXE
Boot or Logon Autostart Execution: Active Setup
Downloads MZ/PE file
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh 7a0d29462ec9548247fb10a6e2ccf36bcaec52468002ab87a4685cb371963a31

(this sample)

  
Delivery method
Distributed via web download

Comments