MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 842ddc9b2aaf46d8defb2ce094e703d66946a55b17b4291d26188bf49a54ee0b. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 4


Intelligence 4 IOCs YARA File information Comments

SHA256 hash: 842ddc9b2aaf46d8defb2ce094e703d66946a55b17b4291d26188bf49a54ee0b
SHA3-384 hash: 58dcca39167d780432a8b898538e975a3950621be937e7ccb3d0276116ca13acea35aae1bc6bf6136d686417f631f25f
SHA1 hash: 7f315f771c7db4c62911cbac9367f5d984281e36
MD5 hash: 73e9516004c01a8f438278508002b849
humanhash: william-freddie-fish-jig
File name:o.xml
Download: download sample
Signature Mirai
File size:761 bytes
First seen:2025-09-01 08:54:45 UTC
Last seen:2025-09-02 07:06:13 UTC
File type: sh
MIME type:text/plain
ssdeep 12:FH8ioNJAC7ukxGWi2jU30+0K5+A+FjRBkdIkVDplkdIkVDsJB7ZhG+E6:FH8j/wWi2jz9IdIQSdI7
TLSH T144012BBE91B8895206B5C4C7B2B4910AC491808BD2FE5BE1F38D49336F66CCE3C6320D
Magika xml
Reporter abuse_ch
Tags:sh
URLMalware sample (SHA256 hash)SignatureTags
http://41.216.189.108/00101010101001/morte.x86_643af40b5a3d850ee6d5bf827fd7d0ee0b52924e6914afc2e779d43228d19bc519 Miraielf geofenced mirai opendir ua-wget USA

Intelligence


File Origin
# of uploads :
4
# of downloads :
42
Origin country :
DE DE
Vendor Threat Intelligence
Verdict:
Suspicious
Labled as:
TrojanDownloader/Linux.NetLoader
Status:
terminated
Behavior Graph:
%3 guuid=445715ff-1800-0000-c74e-01d01a120000 pid=4634 /usr/bin/sudo guuid=bad55901-1900-0000-c74e-01d021120000 pid=4641 /tmp/sample.bin guuid=445715ff-1800-0000-c74e-01d01a120000 pid=4634->guuid=bad55901-1900-0000-c74e-01d021120000 pid=4641 execve guuid=324aa201-1900-0000-c74e-01d022120000 pid=4642 /usr/bin/dash guuid=bad55901-1900-0000-c74e-01d021120000 pid=4641->guuid=324aa201-1900-0000-c74e-01d022120000 pid=4642 clone guuid=44abb501-1900-0000-c74e-01d024120000 pid=4644 /usr/bin/dash guuid=bad55901-1900-0000-c74e-01d021120000 pid=4641->guuid=44abb501-1900-0000-c74e-01d024120000 pid=4644 clone guuid=e2f3c501-1900-0000-c74e-01d026120000 pid=4646 /usr/bin/curl net guuid=bad55901-1900-0000-c74e-01d021120000 pid=4641->guuid=e2f3c501-1900-0000-c74e-01d026120000 pid=4646 execve a4e02df3-c7fa-5be2-b410-afe687812c07 41.216.189.108:80 guuid=e2f3c501-1900-0000-c74e-01d026120000 pid=4646->a4e02df3-c7fa-5be2-b410-afe687812c07 con
Threat name:
Script.Trojan.Heuristic
Status:
Malicious
First seen:
2025-09-01 09:17:44 UTC
File Type:
Text
AV detection:
3 of 24 (12.50%)
Threat level:
  2/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Modifies registry class
Suspicious use of SetWindowsHookEx
Enumerates physical storage devices
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh 842ddc9b2aaf46d8defb2ce094e703d66946a55b17b4291d26188bf49a54ee0b

(this sample)

  
Delivery method
Distributed via web download

Comments