MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 7f455160c2db6e8cfb31dfb91a8ed34c4641d293ee4cd53fd6f0dc2dd087abfe. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 4


Intelligence 4 IOCs YARA File information Comments

SHA256 hash: 7f455160c2db6e8cfb31dfb91a8ed34c4641d293ee4cd53fd6f0dc2dd087abfe
SHA3-384 hash: c040f323c2a4854051a325fbe92d66f56e19109d6b31bf65cb42106f3f05a6aa4875a839cfb7741bd2c5c233f7206f0b
SHA1 hash: cd7e63def2917b73b72b67da67c1940f546374d7
MD5 hash: 518c4ee3fdcfba8d84e249cd29e7b601
humanhash: virginia-oregon-autumn-stream
File name:zxc.sh
Download: download sample
Signature Mirai
File size:630 bytes
First seen:2025-02-10 16:41:28 UTC
Last seen:Never
File type: sh
MIME type:text/plain
ssdeep 12:JLngBtuYnedBnxaLBBGf2nWNITPYn7ynN:JcBENnaLBBGfDNITr
TLSH T188F0626A0196BF47C46C9E39B63A747BB031C2CE914B0785BED9047D985D652BD30D81
Magika shell
Reporter abuse_ch
Tags:mirai sh
URLMalware sample (SHA256 hash)SignatureTags
http://94.156.167.35/splmips4fc73b02bd0cc4d44ee8da03ce5ab8b74fb67409fb223c3f36b06dc22dc0dd74 Gafgytelf gafgyt ua-wget
http://94.156.167.35/splmpsl18c99e6db38118a4d50a0bca8dd475f700d3ff172a73fb6a48bdd599d4abae95 Gafgytelf gafgyt ua-wget
http://94.156.167.35/splarm2f66b28645b910c0fcb7a751e9a0dad86fd2be825d07f45dd6ab086ec2eeafc0 Miraielf mirai ua-wget
http://94.156.167.35/splarm50b051fb3621726c4525a268f2bb2c12456cc238b0b301c249feb2872177ae517 Miraielf mirai ua-wget
http://94.156.167.35/splarm6n/an/an/a
http://94.156.167.35/splarm7d2ea0eed1f82458ed76a956ca3fd1f72d1c1e29b40a6118d1e5f1e6d78418077 Miraielf mirai ua-wget

Intelligence


File Origin
# of uploads :
1
# of downloads :
71
Origin country :
DE DE
Vendor Threat Intelligence
Result
Verdict:
UNKNOWN
Threat name:
Linux.Trojan.Generic
Status:
Suspicious
First seen:
2025-02-10 16:42:22 UTC
File Type:
Text (Shell)
AV detection:
11 of 24 (45.83%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
adware discovery persistence privilege_escalation stealer
Behaviour
Modifies Internet Explorer settings
Modifies data under HKEY_USERS
Modifies registry class
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
System policy modification
Uses Task Scheduler COM API
Enumerates physical storage devices
System Location Discovery: System Language Discovery
System Network Configuration Discovery: Internet Connection Discovery
Drops file in Program Files directory
Drops file in System32 directory
Checks installed software on the system
Installs/modifies Browser Helper Object
Event Triggered Execution: Component Object Model Hijacking
Executes dropped EXE
Boot or Logon Autostart Execution: Active Setup
Downloads MZ/PE file
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh 7f455160c2db6e8cfb31dfb91a8ed34c4641d293ee4cd53fd6f0dc2dd087abfe

(this sample)

  
Delivery method
Distributed via web download

Comments