MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 7c2aa975c02cbffdafd7b093b5dbf82aad166dd5c0b239caf6f643d5b271521e. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: 7c2aa975c02cbffdafd7b093b5dbf82aad166dd5c0b239caf6f643d5b271521e
SHA3-384 hash: 4a6bdd892189b0d5083044e551304c2fa54734cc564ad4d7fa1fcb124026cf1d06a39daeff6b3f0d035b42d5c90b2ad8
SHA1 hash: 9956382c6e4228c03b353d94bf58e3b3663e593b
MD5 hash: 0141530808feb43f76dcfab4a602fc89
humanhash: ceiling-uniform-mango-bluebird
File name:wop
Download: download sample
Signature Mirai
File size:572 bytes
First seen:2025-03-07 01:11:48 UTC
Last seen:Never
File type: sh
MIME type:text/plain
ssdeep 12:afWUj2etfWAkT+rfWVGfWRaLBHTyafW2NITt9SfWbTWB:eWUj22WAkCrWVyWRaLBHTyeW2NIp92WS
TLSH T124F03CAD007AFE43C0ACAE1635A6F1B7B5308285100B1B4DFED9147CA88C911A274FD9
Magika txt
Reporter abuse_ch
Tags:sh
URLMalware sample (SHA256 hash)SignatureTags
http://176.65.134.5/splmips46894ab0365d99a0bb377497478ebabe75c295d6119ab5dce7c7c1ea90086efa Miraielf mirai
http://176.65.134.5/splmpslf135cf3046be829d6f1b7ef020c5dd9eca385aed561d782f8b4d03220a2a833d Miraielf mirai
http://176.65.134.5/splarm0c173caa930b8d384c6ae942987c9c0f51371f12f585a0e34d3b4e13d89f5b5b Miraielf mirai
http://176.65.134.5/splarm5c7bf13560d86a03a4b2d614105f2f45340652ebaad205c82194af27448b9b8ff Miraielf mirai
http://176.65.134.5/splarm6f2128b77af9e414b09f8427f9b1efee438971b7a99478031cb81eb99df1831e1 Miraielf mirai
http://176.65.134.5/splarm78312daded7f34a6803e7ed28ad921c93020cb2c865d669bb4a528e7a9c94ee01 Miraielf mirai

Intelligence


File Origin
# of uploads :
1
# of downloads :
125
Origin country :
DE DE
Vendor Threat Intelligence
Result
Verdict:
UNKNOWN
Threat name:
Linux.Trojan.Generic
Status:
Suspicious
First seen:
2025-03-07 05:48:21 UTC
File Type:
Text (Shell)
AV detection:
13 of 38 (34.21%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
discovery
Behaviour
Modifies registry class
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh 7c2aa975c02cbffdafd7b093b5dbf82aad166dd5c0b239caf6f643d5b271521e

(this sample)

  
Delivery method
Distributed via web download

Comments