MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 7fa0a2e74fbfbae1cb1e776d6974f217be4aeb397c8a16dc6735ae6948c4ebfe. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: 7fa0a2e74fbfbae1cb1e776d6974f217be4aeb397c8a16dc6735ae6948c4ebfe
SHA3-384 hash: 4b6f561971cb5a7387244345bc253aaff49ca082ddee349fd5c1bfa7262941f7084445e9f5642de79a6ef39585c56b68
SHA1 hash: 8599f833a6c1d84353a33995d3c4d7c8dd2d4ddb
MD5 hash: af26181f2b2807884c688a74a66f553a
humanhash: delaware-earth-bravo-aspen
File name:gpon
Download: download sample
Signature Mirai
File size:154 bytes
First seen:2025-12-21 15:13:49 UTC
Last seen:2025-12-22 23:02:18 UTC
File type: sh
MIME type:text/plain
ssdeep 3:LxAjdVZVb8NBzSa+ANja4jzgxAjdVZVCONBzSa5Ap9Lv:L6VbkPjtzg6VxyR
TLSH T10CC0809F102715C1C004AE201091385DB751CDC265F00F0D97C82033F8CD521B70CD18
Magika txt
Reporter abuse_ch
Tags:sh
URLMalware sample (SHA256 hash)SignatureTags
http://130.12.180.64/splmips2928a4694f399990791e7d0c00cb21c7fe852654df493d541097b7ce85815ec5 Miraielf mirai ua-wget
http://130.12.180.64/splmpsl3cd8a62933ca2ee92f4a556c9d59ae1679070eec6343b38d6ef6f75cf5190ced Miraielf mirai ua-wget

Intelligence


File Origin
# of uploads :
2
# of downloads :
38
Origin country :
DE DE
Vendor Threat Intelligence
No detections
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
mirai
Verdict:
Malicious
File Type:
text
First seen:
2025-12-21T12:37:00Z UTC
Last seen:
2025-12-22T14:11:00Z UTC
Hits:
~10
Status:
terminated
Behavior Graph:
%3 guuid=04789155-1900-0000-4a60-c7b3240b0000 pid=2852 /usr/bin/sudo guuid=ab2c1158-1900-0000-4a60-c7b32b0b0000 pid=2859 /tmp/sample.bin guuid=04789155-1900-0000-4a60-c7b3240b0000 pid=2852->guuid=ab2c1158-1900-0000-4a60-c7b32b0b0000 pid=2859 execve guuid=2b635b58-1900-0000-4a60-c7b32c0b0000 pid=2860 /usr/bin/wget net send-data write-file guuid=ab2c1158-1900-0000-4a60-c7b32b0b0000 pid=2859->guuid=2b635b58-1900-0000-4a60-c7b32c0b0000 pid=2860 execve guuid=93e08a5f-1900-0000-4a60-c7b3400b0000 pid=2880 /usr/bin/chmod guuid=ab2c1158-1900-0000-4a60-c7b32b0b0000 pid=2859->guuid=93e08a5f-1900-0000-4a60-c7b3400b0000 pid=2880 execve guuid=b87dc15f-1900-0000-4a60-c7b3420b0000 pid=2882 /usr/bin/dash guuid=ab2c1158-1900-0000-4a60-c7b32b0b0000 pid=2859->guuid=b87dc15f-1900-0000-4a60-c7b3420b0000 pid=2882 clone guuid=bea63860-1900-0000-4a60-c7b3460b0000 pid=2886 /usr/bin/wget net send-data write-file guuid=ab2c1158-1900-0000-4a60-c7b32b0b0000 pid=2859->guuid=bea63860-1900-0000-4a60-c7b3460b0000 pid=2886 execve guuid=020acd65-1900-0000-4a60-c7b3540b0000 pid=2900 /usr/bin/chmod guuid=ab2c1158-1900-0000-4a60-c7b32b0b0000 pid=2859->guuid=020acd65-1900-0000-4a60-c7b3540b0000 pid=2900 execve guuid=ab704866-1900-0000-4a60-c7b3570b0000 pid=2903 /usr/bin/dash guuid=ab2c1158-1900-0000-4a60-c7b32b0b0000 pid=2859->guuid=ab704866-1900-0000-4a60-c7b3570b0000 pid=2903 clone f22fee75-ab34-540d-95fe-696883c6f4ad 130.12.180.64:80 guuid=2b635b58-1900-0000-4a60-c7b32c0b0000 pid=2860->f22fee75-ab34-540d-95fe-696883c6f4ad send: 135B guuid=bea63860-1900-0000-4a60-c7b3460b0000 pid=2886->f22fee75-ab34-540d-95fe-696883c6f4ad send: 135B
Threat name:
Script-Shell.Downloader.Heuristic
Status:
Malicious
First seen:
2025-12-21 15:31:29 UTC
File Type:
Text (Shell)
AV detection:
3 of 24 (12.50%)
Threat level:
  2/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Modifies registry class
Suspicious use of SetWindowsHookEx
Enumerates physical storage devices
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh 7fa0a2e74fbfbae1cb1e776d6974f217be4aeb397c8a16dc6735ae6948c4ebfe

(this sample)

  
Delivery method
Distributed via web download

Comments