MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 87fa7052b3f906a8f5d5781eee333260f48e44f279de299f888504b0dab7b10b. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: 87fa7052b3f906a8f5d5781eee333260f48e44f279de299f888504b0dab7b10b
SHA3-384 hash: 31a2aec73e4824ac964cc4384b3713baa44b63b411972c231c508e06e80a4a9aab759b4301b68e16db97ce67913370ec
SHA1 hash: 0c7d0096fd5ce5f6a9bc8bec2172eff094cbbfa5
MD5 hash: 44b9dd7ae36156aa25a9317745a834c1
humanhash: robin-sixteen-texas-jupiter
File name:grandstream.sh
Download: download sample
Signature Mirai
File size:425 bytes
First seen:2025-12-05 18:22:15 UTC
Last seen:Never
File type: sh
MIME type:text/plain
ssdeep 12:shfIXiVhXjz4IhlaLaNgZhSNIE6VhfLK6c5:efIXibXjz5laLaNgHSNILbDK6w
TLSH T1CCE030BD022FDF2781148C2060A630337033DBC7E0A1CE0EDEC4A036A684D603132E16
Magika txt
Reporter abuse_ch
Tags:sh
URLMalware sample (SHA256 hash)SignatureTags
http://213.209.143.64/splarm96f1feeb93c3a7452740a6f7914e10411b7f8bbc90a9560f4788f3c4ac61c4d0 Miraielf mirai ua-wget
http://213.209.143.64/splarm4n/an/aelf ua-wget
http://213.209.143.64/splarm52a9500af556d33ba63010baf25c7889f3820cfb3ae73bf1e8c9308c6687a3d86 Miraielf mirai ua-wget
http://213.209.143.64/splarm6fa9c55993474f595798a26c92346219f18341bc7ac8ead9effa655a2db87a6fe Miraielf mirai ua-wget
http://213.209.143.64/splarm79fe549c71c620f6572f5c8815dea0d4401af11397444ada0cda8bd2b0fbc1efe Miraicensys elf mirai ua-wget

Intelligence


File Origin
# of uploads :
1
# of downloads :
33
Origin country :
DE DE
Vendor Threat Intelligence
No detections
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
mirai
Verdict:
Malicious
File Type:
text
First seen:
2025-12-05T16:20:00Z UTC
Last seen:
2025-12-06T14:46:00Z UTC
Hits:
~10
Threat name:
Document-HTML.Trojan.Heuristic
Status:
Malicious
First seen:
2025-12-05 18:25:50 UTC
File Type:
Text (Shell)
AV detection:
10 of 37 (27.03%)
Threat level:
  2/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Modifies registry class
Suspicious use of SetWindowsHookEx
Enumerates physical storage devices
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh 87fa7052b3f906a8f5d5781eee333260f48e44f279de299f888504b0dab7b10b

(this sample)

  
Delivery method
Distributed via web download

Comments