MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 7bb5461853cc60cb6540a4eb6cb92e96e28addd7795fcb90f2fc6b322fc54918. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 5


Intelligence 5 IOCs YARA File information Comments

SHA256 hash: 7bb5461853cc60cb6540a4eb6cb92e96e28addd7795fcb90f2fc6b322fc54918
SHA3-384 hash: 77615a4f6d27dc2afe2fd6f166a455366cbbb3e7c550b74db46ada27d9bcd14d753b901d672957739a3261001a7c4fae
SHA1 hash: 427edc4e8acba05ea1f76fc427538275c64bcd7e
MD5 hash: 03d09b5ce3ef15dc2b1134bace6918ab
humanhash: one-april-carbon-vermont
File name:ru.sh
Download: download sample
Signature Mirai
File size:4'905 bytes
First seen:2025-12-10 08:14:55 UTC
Last seen:Never
File type: sh
MIME type:text/plain
ssdeep 96:1xLc8okWcegXz49Lt6o/IvUAkMSg2MX/Bq6X6dvkrUB1fOfe:R7Xz49Lt6owvUAkMB2MXpvX6dvkrUB1/
TLSH T19BA108DD78603333CD92AE3DF6A58D1F2081C0C089258F94E65930FD75ABE56F650EA9
Magika shell
Reporter abuse_ch
Tags:mirai sh
URLMalware sample (SHA256 hash)SignatureTags
http://92.112.125.172/z/89/mips67d14607625e9959f595650cae0dab34d9dbaed8baca79270c9aee9a5f8dab6f Miraielf mirai ua-wget
http://92.112.125.172/z/89/mpsld737b65bddabf106eb6642a551b2b4c848101ae57e00de37c9d9a2670a52f9d9 Miraielf mirai ua-wget
http://92.112.125.172/z/89/x86_6413d151f0910a9ec48ea9a1854ec4ed04c50b920673a2d963bcc7fa233d217126 Miraielf mirai ua-wget
http://92.112.125.172/z/89/arm4n/an/aelf ua-wget
http://92.112.125.172/z/89/arm571ecf29f0548ecb0051046067bf46b3966c596a554bde739db08900b38198918 Miraielf mirai ua-wget
http://92.112.125.172/z/89/arm65e40a628404e0381d24f344df4e0250f01e94137aa3f98602b631c71a5c329c1 Miraielf mirai ua-wget
http://92.112.125.172/z/89/arm72f220f990fa4b3dd2db426c36428a4a66a0a55fbbb98dc3b5f1fbc240f692002 Miraielf mirai ua-wget

Intelligence


File Origin
# of uploads :
1
# of downloads :
46
Origin country :
DE DE
Vendor Threat Intelligence
No detections
Verdict:
Malicious
File Type:
text
First seen:
2025-12-10T06:26:00Z UTC
Last seen:
2025-12-10T11:18:00Z UTC
Hits:
~10
Threat name:
Linux.Downloader.Medusa
Status:
Malicious
First seen:
2025-12-10 07:18:43 UTC
File Type:
Text (Shell)
AV detection:
12 of 24 (50.00%)
Threat level:
  3/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Modifies registry class
Suspicious use of SetWindowsHookEx
Enumerates physical storage devices
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh 7bb5461853cc60cb6540a4eb6cb92e96e28addd7795fcb90f2fc6b322fc54918

(this sample)

  
Delivery method
Distributed via web download

Comments