MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 841650f051565d262f72c66ba29408fba38e0e6e771a110a4e9509cdad5b75ad. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 6


Intelligence 6 IOCs YARA 1 File information Comments

SHA256 hash: 841650f051565d262f72c66ba29408fba38e0e6e771a110a4e9509cdad5b75ad
SHA3-384 hash: fbd6f871c25409e2729a159ddb27a32471fba54bf3beb38af761e7d0e88ab217d66a3c5ab46d93d1ea7068e02ed7e8b2
SHA1 hash: 6e9564d12187bbd20fd730af90f8670175e322b6
MD5 hash: f62fb7683b734db9c71f4e981afd68af
humanhash: foxtrot-double-eight-delaware
File name:mq.sh
Download: download sample
Signature Mirai
File size:1'796 bytes
First seen:2025-04-15 12:17:54 UTC
Last seen:Never
File type: sh
MIME type:text/plain
ssdeep 48:15Of505M5VtBy5I5Xs5HU5t+5q6Ha5U5w5k5MW:15g505M5PBy5I5c5HU5w5q6Ha5U5w5kl
TLSH T1DC317EDA21F516B02FA0A577F6688C017DE8E2CE09CE2F196EDC38FB40DDE446508687
Magika txt
Reporter abuse_ch
Tags:sh
URLMalware sample (SHA256 hash)SignatureTags
http://pirati.privatedns.org/mqms646e22539c017087ee8c76af0e3e9a1d9fdd16f9f3dcb60697e1440eabf23596 Miraielf mirai
http://pirati.privatedns.org/mqmlaf9ffeb5447b6d7982a82fca7122fe9310e1d2d2966f60efcad6641214e36023 Miraielf mirai
http://pirati.privatedns.org/mqsh7419328518ce5180c4bd0fae15f950d61218eb00403d1f61991cb0fb4583aa87 Miraielf mirai
http://pirati.privatedns.org/mq86959caba248cbae06b4c76a4508003bd9d652bbd9867702a80645a7910d356320 Miraielf mirai
http://pirati.privatedns.org/mqar61e613f3f1bfd5ccbf190aa43b152eba8cdfb61c0a81b1dd6ab753b100ffefeec Miraielf mirai
http://pirati.privatedns.org/mqi686696a6982fde964537da8553c138cd575a4de65b225b5d37c73bc974a583306bd Miraielf mirai
http://pirati.privatedns.org/mqppc904077235a9d94979a1eaaa011f9fd6a1bf40620dd6b95b4e9387fcc1fc82e46 Miraielf mirai
http://pirati.privatedns.org/mqi5864c1632ab85b2392ffd53012575887c6787221e041a926d50b24fc4a1854fc5e0 Miraielf mirai
http://pirati.privatedns.org/mqm68k4cce7ffe9eb4be605c6119be3df62c8caee9ccf0737bc2b824317f79bb54e777 Miraielf mirai
http://pirati.privatedns.org/mqar4fd8890a2ccf009d7531cb7e6beaff7160dc27342752abfdfc46af54f756118b6 Miraielf mirai
http://pirati.privatedns.org/mqar509aeb79d5573cacc33892805983522c6358505d379db4d8240572579ee212760 Miraielf mirai
http://pirati.privatedns.org/mqar75b735289f2cb3a772aade1d19cc53ac822497a6adeeed13f32f65e321af732fe Miraielf mirai
http://pirati.privatedns.org/mqspcr0b2459db45b900b80bc56a95a66877810fafde3623962177d605648ff6237cd6 Miraielf mirai

Intelligence


File Origin
# of uploads :
1
# of downloads :
67
Origin country :
DE DE
Vendor Threat Intelligence
Verdict:
Malicious
Score:
97.4%
Tags:
medusa virus shell
Threat name:
Linux.Downloader.Medusa
Status:
Malicious
First seen:
2025-04-15 12:18:21 UTC
File Type:
Text (Shell)
AV detection:
15 of 24 (62.50%)
Threat level:
  3/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Modifies registry class
Suspicious use of SetWindowsHookEx
Enumerates physical storage devices
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:ach_202412_suspect_bash_script
Author:abuse.ch
Description:Detects suspicious Linux bash scripts

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh 841650f051565d262f72c66ba29408fba38e0e6e771a110a4e9509cdad5b75ad

(this sample)

  
Delivery method
Distributed via web download

Comments