MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 8599b16eace1c51d44969f51251f725dde69a5a0377f9925a2a86698a25ed0f7. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: 8599b16eace1c51d44969f51251f725dde69a5a0377f9925a2a86698a25ed0f7
SHA3-384 hash: 4fc3ff39c460a0d354c46eb8899aa1bc9bceb7a08fb44a8d0e97dd1e5ed473e7addeca6df1ba3c69acb31d9633e3579d
SHA1 hash: ce03f05bca4180a3d0e7dff912e087be5231afcc
MD5 hash: f2a660bf3b3fba1352b545c6a17cd200
humanhash: green-arkansas-fish-dakota
File name:e
Download: download sample
Signature Mirai
File size:4'954 bytes
First seen:2025-12-14 22:59:30 UTC
Last seen:Never
File type: sh
MIME type:text/plain
ssdeep 48:1tLcBLL/LHidLuGLjnqLSCLpXfSTCgwN/7jihC0fngWodXokgiJrnuNXUIxrZbEK:1x6fHgLTcppXhgCzjMnfgtdXWIOXBQtu
TLSH T1CEA146DD78A117B3CEE09D28F665497F6042D1D88C76EFA4E46DB0BDB4ABD48B200E04
Magika txt
Reporter abuse_ch
Tags:mirai sh
URLMalware sample (SHA256 hash)SignatureTags
http://158.94.208.162/z/89/mips1ef86f38b7e44a7511f09e4bec9a1da105e70db6d522467ac14b4ea42df632c9 Miraielf mirai ua-wget
http://158.94.208.162/z/89/mpslb3af651dbf2ffce881ed5539fcb7a3371f94f301eb4f7ac757d6aba63e5e1038 Miraielf mirai ua-wget
http://158.94.208.162/z/89/x86_649c033cf8304f0ed83cbba11c153b4fa29d766a90e57b1e8b715b9d25ef05ed76 Miraielf mirai ua-wget
http://158.94.208.162/z/89/arm4n/an/aelf ua-wget
http://158.94.208.162/z/89/arm571ecf29f0548ecb0051046067bf46b3966c596a554bde739db08900b38198918 Miraielf mirai ua-wget
http://158.94.208.162/z/89/arm628d8a15cfb38b9e56722fac60e7b53c84f53fcd678a62f67e82312be67b88bd7 Miraielf mirai ua-wget
http://158.94.208.162/z/89/arm78730e029d0f40e909494760198bd41b3a6aa44843a8968910cff20dea0fc35ca Miraielf mirai ua-wget

Intelligence


File Origin
# of uploads :
1
# of downloads :
37
Origin country :
DE DE
Vendor Threat Intelligence
No detections
Verdict:
Malicious
File Type:
text
First seen:
2025-12-14T16:55:00Z UTC
Last seen:
2025-12-16T08:34:00Z UTC
Hits:
~10
Threat name:
Linux.Downloader.Medusa
Status:
Malicious
First seen:
2025-12-14 23:10:22 UTC
File Type:
Text (Shell)
AV detection:
17 of 36 (47.22%)
Threat level:
  3/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Modifies registry class
Suspicious use of SetWindowsHookEx
Enumerates physical storage devices
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh 8599b16eace1c51d44969f51251f725dde69a5a0377f9925a2a86698a25ed0f7

(this sample)

  
Delivery method
Distributed via web download

Comments