MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 8ad148030313ea1275209b5317cdb551c029a2ba75919065549327cb32a1ad2d. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: 8ad148030313ea1275209b5317cdb551c029a2ba75919065549327cb32a1ad2d
SHA3-384 hash: 3e40a532f3ee64f9e09eba69c002a79267b823682b7f59eb33bb4dabe6f63c2925909298e647275a7ac1d504c513bdc7
SHA1 hash: c8b78f31b6196dea4108b990e01cdf1295bafbea
MD5 hash: 52f4d01821280b78dd29b92ed1e78d10
humanhash: wisconsin-oklahoma-timing-east
File name:tplink.sh
Download: download sample
Signature Mirai
File size:1'233 bytes
First seen:2025-09-25 09:39:50 UTC
Last seen:Never
File type: sh
MIME type:text/x-shellscript
ssdeep 12:zu6oRYB8XOp3dKU2hCUKAMk8QdqxQJ+DpV6TCUfrC1Zi5CPn/KTCCWa0LK7TCaHI:boWBGhBh9Mk8QoOw7ysZbiCKHgatkk0
TLSH T1882166CAB59292610E6C8E40B5D6C825A01E6BC730E06E69FC4F2C62BD58E91F059B35
Magika shell
Reporter abuse_ch
Tags:mirai sh
URLMalware sample (SHA256 hash)SignatureTags
http://160.250.134.61/mips8e8239ebc8b41e0cb7f7452f6293f5a5dd4d2f7bd706df0f9e399413e8df328b Gafgytelf gafgyt geofenced mips ua-wget USA
http://160.250.134.61/mpslaea8ad044799f08ef2a9d6bf1617de28d4669ba1fea99f308550af3c87b70349 Gafgytelf gafgyt geofenced mips mirai ua-wget USA
http://160.250.134.61/arm86c913791bb43de279ba0ecacbe54a5ba85bfbc96a23824ff9c6fd6644f7def7 Miraiarm elf geofenced mirai ua-wget USA
http://160.250.134.61/arm50841551fe33de70d71ebe9a6b62bc95ab0b532eff3e22b642d1d070055f45c3c Miraiarm elf geofenced mirai ua-wget USA
http://160.250.134.61/arm7dd42fda90826e3f259b46e9817c9449571a35a4fe6a067440adc8051c250dfa5 Miraiarm elf geofenced mirai ua-wget USA
http://160.250.134.61/x86319be0c57536a1e1f191f508a1acf397993c6967d2da9f897e318fa0b3758f77 Miraielf mirai

Intelligence


File Origin
# of uploads :
1
# of downloads :
39
Origin country :
DE DE
Vendor Threat Intelligence
Verdict:
Malicious
File Type:
unix shell
First seen:
2025-09-25T04:04:00Z UTC
Last seen:
2025-09-25T04:04:00Z UTC
Hits:
~10
Detections:
HEUR:Trojan-Downloader.Shell.Agent.a
Threat name:
Linux.Worm.Mirai
Status:
Malicious
First seen:
2025-09-24 16:07:27 UTC
File Type:
Text (Shell)
AV detection:
12 of 36 (33.33%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  9/10
Tags:
credential_access defense_evasion discovery linux
Behaviour
Reads runtime system information
System Network Configuration Discovery
Writes file to tmp directory
Changes its process name
Reads process memory
Enumerates running processes
File and Directory Permissions Modification
Deletes itself
Executes dropped EXE
Unexpected DNS network traffic destination
Contacts a large (25185) amount of remote hosts
Creates a large amount of network flows
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh 8ad148030313ea1275209b5317cdb551c029a2ba75919065549327cb32a1ad2d

(this sample)

  
Delivery method
Distributed via web download

Comments