MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 7deb20112eecf14b49e3aa3117e44a6d6d4d4420472f9d95e6abff783598d060. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: 7deb20112eecf14b49e3aa3117e44a6d6d4d4420472f9d95e6abff783598d060
SHA3-384 hash: b01ec2e6bffb984fbfd82df6048c9d3345e9e79dad8171197adf83352ed8c0516c693cd57bfd24c5c3c1739afc56b615
SHA1 hash: eac5bdc7a57bbb7c9a7626700596bbf9510667a0
MD5 hash: cf8772aa74bd9997a9d84529a58fb7d9
humanhash: three-uncle-ceiling-sweet
File name:gp
Download: download sample
Signature Mirai
File size:353 bytes
First seen:2025-12-05 18:22:17 UTC
Last seen:Never
File type: sh
MIME type:text/plain
ssdeep 6:LA5/wkPjkxVocA5/My1VocA5/rHz2cocA5/nfiAK6iTLVp:shRksxhMy1qxhf2bxhfLK68
TLSH T15EE0487D002BAB02C4189E15B5353C6AB133C7CA64738B4BFDDC3036B149D207322D58
Magika txt
Reporter abuse_ch
Tags:sh
URLMalware sample (SHA256 hash)SignatureTags
http://213.209.143.64/splmips633397cf2ca1b26757c7f32fe2e980ea66f783becff9455e11ded00b20032417 Miraielf mirai ua-wget
http://213.209.143.64/splmpsl61d0e0c8b1e9fdf341c8bbaacc50fe6cc5c5f73d4b7cb0f80808e6fedbf70d3c Miraielf mirai ua-wget
http://213.209.143.64/splarm7d879b6d1a523fc7b10eec5dec0ebcd1b8068317a7d3633522ce439cc33f7aec Miraielf mirai ua-wget
http://213.209.143.64/splarm7bbe9f2fbdcbdbc2571b15610d4f09c1553128665024b8c87fa973a21267e5941 Miraicensys elf mirai ua-wget

Intelligence


File Origin
# of uploads :
1
# of downloads :
26
Origin country :
DE DE
Vendor Threat Intelligence
No detections
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
mirai
Verdict:
Malicious
File Type:
text
First seen:
2025-12-05T17:00:00Z UTC
Last seen:
2025-12-07T12:50:00Z UTC
Hits:
~10
Status:
terminated
Behavior Graph:
%3 guuid=a6ea5374-2000-0000-b134-828b630b0000 pid=2915 /usr/bin/sudo guuid=4839fc75-2000-0000-b134-828b690b0000 pid=2921 /tmp/sample.bin guuid=a6ea5374-2000-0000-b134-828b630b0000 pid=2915->guuid=4839fc75-2000-0000-b134-828b690b0000 pid=2921 execve guuid=1ae22f76-2000-0000-b134-828b6a0b0000 pid=2922 /usr/bin/wget net send-data write-file guuid=4839fc75-2000-0000-b134-828b690b0000 pid=2921->guuid=1ae22f76-2000-0000-b134-828b6a0b0000 pid=2922 execve guuid=a0e64b8e-2000-0000-b134-828b700b0000 pid=2928 /usr/bin/chmod guuid=4839fc75-2000-0000-b134-828b690b0000 pid=2921->guuid=a0e64b8e-2000-0000-b134-828b700b0000 pid=2928 execve guuid=c775ab8e-2000-0000-b134-828b710b0000 pid=2929 /usr/bin/dash guuid=4839fc75-2000-0000-b134-828b690b0000 pid=2921->guuid=c775ab8e-2000-0000-b134-828b710b0000 pid=2929 clone guuid=b50a8b90-2000-0000-b134-828b730b0000 pid=2931 /usr/bin/rm guuid=4839fc75-2000-0000-b134-828b690b0000 pid=2921->guuid=b50a8b90-2000-0000-b134-828b730b0000 pid=2931 execve guuid=c2efd390-2000-0000-b134-828b740b0000 pid=2932 /usr/bin/wget net send-data write-file guuid=4839fc75-2000-0000-b134-828b690b0000 pid=2921->guuid=c2efd390-2000-0000-b134-828b740b0000 pid=2932 execve guuid=dddc2295-2000-0000-b134-828b750b0000 pid=2933 /usr/bin/chmod guuid=4839fc75-2000-0000-b134-828b690b0000 pid=2921->guuid=dddc2295-2000-0000-b134-828b750b0000 pid=2933 execve guuid=d226b895-2000-0000-b134-828b760b0000 pid=2934 /usr/bin/dash guuid=4839fc75-2000-0000-b134-828b690b0000 pid=2921->guuid=d226b895-2000-0000-b134-828b760b0000 pid=2934 clone guuid=588ddb96-2000-0000-b134-828b780b0000 pid=2936 /usr/bin/rm guuid=4839fc75-2000-0000-b134-828b690b0000 pid=2921->guuid=588ddb96-2000-0000-b134-828b780b0000 pid=2936 execve guuid=85a46297-2000-0000-b134-828b790b0000 pid=2937 /usr/bin/wget net send-data write-file guuid=4839fc75-2000-0000-b134-828b690b0000 pid=2921->guuid=85a46297-2000-0000-b134-828b790b0000 pid=2937 execve guuid=2e0c7d9c-2000-0000-b134-828b7b0b0000 pid=2939 /usr/bin/chmod guuid=4839fc75-2000-0000-b134-828b690b0000 pid=2921->guuid=2e0c7d9c-2000-0000-b134-828b7b0b0000 pid=2939 execve guuid=bd32d89c-2000-0000-b134-828b7c0b0000 pid=2940 /usr/bin/dash guuid=4839fc75-2000-0000-b134-828b690b0000 pid=2921->guuid=bd32d89c-2000-0000-b134-828b7c0b0000 pid=2940 clone guuid=15b7a19d-2000-0000-b134-828b800b0000 pid=2944 /usr/bin/rm guuid=4839fc75-2000-0000-b134-828b690b0000 pid=2921->guuid=15b7a19d-2000-0000-b134-828b800b0000 pid=2944 execve guuid=f8a20e9e-2000-0000-b134-828b820b0000 pid=2946 /usr/bin/wget net send-data write-file guuid=4839fc75-2000-0000-b134-828b690b0000 pid=2921->guuid=f8a20e9e-2000-0000-b134-828b820b0000 pid=2946 execve guuid=66a62ea3-2000-0000-b134-828b890b0000 pid=2953 /usr/bin/chmod guuid=4839fc75-2000-0000-b134-828b690b0000 pid=2921->guuid=66a62ea3-2000-0000-b134-828b890b0000 pid=2953 execve guuid=18e478a3-2000-0000-b134-828b8a0b0000 pid=2954 /usr/bin/dash guuid=4839fc75-2000-0000-b134-828b690b0000 pid=2921->guuid=18e478a3-2000-0000-b134-828b8a0b0000 pid=2954 clone guuid=5abbd7a5-2000-0000-b134-828b900b0000 pid=2960 /usr/bin/rm guuid=4839fc75-2000-0000-b134-828b690b0000 pid=2921->guuid=5abbd7a5-2000-0000-b134-828b900b0000 pid=2960 execve b3bc708e-8ccc-5219-9688-8bb7f25e7035 213.209.143.64:80 guuid=1ae22f76-2000-0000-b134-828b6a0b0000 pid=2922->b3bc708e-8ccc-5219-9688-8bb7f25e7035 send: 136B guuid=c2efd390-2000-0000-b134-828b740b0000 pid=2932->b3bc708e-8ccc-5219-9688-8bb7f25e7035 send: 136B guuid=85a46297-2000-0000-b134-828b790b0000 pid=2937->b3bc708e-8ccc-5219-9688-8bb7f25e7035 send: 135B guuid=f8a20e9e-2000-0000-b134-828b820b0000 pid=2946->b3bc708e-8ccc-5219-9688-8bb7f25e7035 send: 136B
Threat name:
Document-HTML.Downloader.Heuristic
Status:
Malicious
First seen:
2025-12-05 18:33:26 UTC
File Type:
Text (Shell)
AV detection:
12 of 37 (32.43%)
Threat level:
  2/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Modifies registry class
Suspicious use of SetWindowsHookEx
Enumerates physical storage devices
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh 7deb20112eecf14b49e3aa3117e44a6d6d4d4420472f9d95e6abff783598d060

(this sample)

  
Delivery method
Distributed via web download

Comments