MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 8451c6d244503dfe5e808ef5028acc7e1c68c454fddc6dbf5aaebc44b5c4226d. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: 8451c6d244503dfe5e808ef5028acc7e1c68c454fddc6dbf5aaebc44b5c4226d
SHA3-384 hash: 79448675716c9ff4ecce94fa2ac5ff2a501ee5c2f88773791079db5361bc1f606d87768cd982fa8d76bd342a59cebfc1
SHA1 hash: 162b62f7dba07a731a98e2f79c123ab537000e82
MD5 hash: d74e48d396262972bf2ecda529a4b168
humanhash: black-november-blossom-delta
File name:sksk
Download: download sample
Signature Mirai
File size:247 bytes
First seen:2025-12-05 18:23:51 UTC
Last seen:Never
File type: sh
MIME type:text/plain
ssdeep 6:LMFt5/jNwAK7PhumVMFt5/ZWJNwAbJ78JhumVMFt5//SaqA3LKfaoe:oth2AkxKthoTwA2DxKth/SaqA3LKyoe
TLSH T19ED05EFD8216913A420BED5C7035EF867033E38F31229F03AC8830BAF2C8824B022E10
Magika txt
Reporter abuse_ch
Tags:sh
URLMalware sample (SHA256 hash)SignatureTags
http://213.209.143.64/zermips3f622b288e8182003119ed88145a8c767b94813a364eae2c6e12344c8787ca3e Miraielf mirai ua-wget
http://213.209.143.64/zermpsld601648e9899e851aeed28f8647b34e99568d2db7ec355b1bb006a13ef3193a8 Miraielf mirai ua-wget
http://213.209.143.64/zerarm7ef12fe69eb0c0ec839cc768a64b74563981254355bfc070aa3f710ef76444447 Miraicensys elf mirai ua-wget

Intelligence


File Origin
# of uploads :
1
# of downloads :
33
Origin country :
DE DE
Vendor Threat Intelligence
No detections
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
mirai
Verdict:
Malicious
File Type:
text
First seen:
2025-12-05T16:20:00Z UTC
Last seen:
2025-12-06T02:00:00Z UTC
Hits:
~10
Threat name:
Document-HTML.Trojan.Heuristic
Status:
Malicious
First seen:
2025-12-05 18:36:26 UTC
File Type:
Text (Shell)
AV detection:
10 of 37 (27.03%)
Threat level:
  2/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Modifies registry class
Suspicious use of SetWindowsHookEx
Enumerates physical storage devices
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh 8451c6d244503dfe5e808ef5028acc7e1c68c454fddc6dbf5aaebc44b5c4226d

(this sample)

  
Delivery method
Distributed via web download

Comments