MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 88c8b2f417f84c2c5ed3620221676323be8c6653cae0813a2f570da36f39f905. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: 88c8b2f417f84c2c5ed3620221676323be8c6653cae0813a2f570da36f39f905
SHA3-384 hash: 72bbb1ef34041d7c65f730d6425ee88065532349ad267f7c85817b0098461ba99e3b42129bf50f65e6b581b189fdb6b6
SHA1 hash: 5c10e2da364af71731f6cd40090e545bd4a64b5b
MD5 hash: 13051e1f2c7863e1d3b8a098bf5e6ffe
humanhash: michigan-venus-music-london
File name:zxc.sh
Download: download sample
Signature Mirai
File size:573 bytes
First seen:2025-02-26 19:48:28 UTC
Last seen:Never
File type: sh
MIME type:text/plain
ssdeep 12:B3j2ewxkT+aa1eaLBHTyB/NITt95kTWknN:9j2PkC5saLBHTyZNIp9tm
TLSH T120F044ED00BBBF13C458EE1A756AB5B7B5709188504647C9FEC9107CA48C9127175FA2
Magika shell
Reporter abuse_ch
Tags:sh
URLMalware sample (SHA256 hash)SignatureTags
http://46.19.143.10/splmipsa2f2572c3a3e6455979ec3892347faaea8c2dbaa11f2681462b8e8a38b2074e7 Miraimirai opendir
http://46.19.143.10/splmpslfa19a01b6bfd5bd2bbccabb27ea70f1554686075982f9e9e4ed307bbe3785c77 Miraimirai opendir
http://46.19.143.10/splarm9c3c7e687d6f8613920b8757ff0c1b9d23d79d31336ff168ee156c884bfbfc1a Miraimirai opendir
http://46.19.143.10/splarm5728b11daee6107fc34691de2eb5261a286d3d84f9cd02494442876084087ae6f Miraimirai opendir
http://46.19.143.10/splarm6a22981dc1d2bf6b1cb09ed0ec46e21eb26d4283a908244a2892cdf0b0d4b5ec0 Miraimirai opendir
http://46.19.143.10/splarm71f429e2c3be03639b683b89caab099f6a1c5047a089c017d9d8e86d0ce12e48b Miraimirai opendir

Intelligence


File Origin
# of uploads :
1
# of downloads :
79
Origin country :
DE DE
Vendor Threat Intelligence
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
evasive
Result
Verdict:
UNKNOWN
Threat name:
Script.Trojan.Heuristic
Status:
Malicious
First seen:
2025-02-26 19:49:23 UTC
File Type:
Text (Shell)
AV detection:
12 of 24 (50.00%)
Threat level:
  2/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
discovery
Behaviour
Modifies registry class
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh 88c8b2f417f84c2c5ed3620221676323be8c6653cae0813a2f570da36f39f905

(this sample)

Comments