MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 8dcc3e92c112fb94931bd86055dc51f74a70007c058d1571a4eaec583a0852c0. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: 8dcc3e92c112fb94931bd86055dc51f74a70007c058d1571a4eaec583a0852c0
SHA3-384 hash: 2c0387be416f64f20aad9fab876a8eeaf69981e570a8b88445e79a9f01fd35eccc9e19507234997e04d443c93945b0c9
SHA1 hash: d631b6a4eaa99085df4260727c2c86dc82cf5428
MD5 hash: fe3891afe068ca6fc86017361dfb753c
humanhash: fruit-carbon-oxygen-harry
File name:wget.sh
Download: download sample
Signature Mirai
File size:1'592 bytes
First seen:2025-03-10 22:21:24 UTC
Last seen:Never
File type: sh
MIME type:text/x-shellscript
ssdeep 48:Fgovrr3zB7v1hOMcvJbNLvhibz10so946IopjIJwxcQtXE6oV9:iovrrDB7v1TcvJJLvhCB0sE5I6Wyv9G9
TLSH T1963120C145D1277ECCDCD9267753D0BD5068A9C62E2B2EDDE8CA18E4BA40AD2F064ECD
Magika shell
Reporter abuse_ch
Tags:mirai sh
URLMalware sample (SHA256 hash)SignatureTags
http://176.65.134.5/jklarmc4fd68b20997f3c8a60dbadf177b3309d465f0a8bb0ad9b33b4c70ee74dc3a90 Mirai403 dosbot Micheal mirai Mirai.TBOT skids Supplys ua-wget
http://176.65.134.5/jklarm57568e9e64ac1105cdcae20095154214ee943b2edc6c01e6d4b4eb0b7e06255a3 Mirai403 dosbot Micheal mirai Mirai.TBOT skids Supplys ua-wget
http://176.65.134.5/jklarm641342a887d2be09cf0165913b43a5916492e677d20429068d4829a090453ccbb Mirai403 dosbot Micheal mirai Mirai.TBOT skids Supplys ua-wget
http://176.65.134.5/jklarm7fe4e8d464b7849a5483782d0c47e53deaf199e284badad12ed98ca79e47a79d9 Mirai403 dosbot Micheal mirai Mirai.TBOT skids Supplys ua-wget
http://176.65.134.5/jklm68k2866188e4567599fab76b51f822d9a402bc85af7f74dd1927f6ea1af1632a3f2 Miraielf mirai
http://176.65.134.5/jklmipsef931d8ba4966260112b7ed31a1e0b5cd4423becc0397e8eeaee345de903a1ab Mirai403 dosbot Micheal mirai Mirai.TBOT skids Supplys ua-wget
http://176.65.134.5/jklmpsl9cf41e60807702cd85a42ffcabb10f2798193200a381b47f3adbebe65f8360aa Mirai403 dosbot Micheal mirai Mirai.TBOT skids Supplys ua-wget
http://176.65.134.5/jklppc5573fc70c149f6676e1bae8e8a07d916b1690aeb06320689e17a54651c2c7133 Miraielf mirai
http://176.65.134.5/jklsh4b31d22cb1050faa0328fe4f05f03f450bbaccdc4a983d85f058cee4296890280 Miraielf mirai
http://176.65.134.5/jklspc3aa1d026ee53ee5a28402ca88d0dd08568cefc831aad924ea8123152bf6d529c Miraielf mirai
http://176.65.134.5/jklx86fb1458decd00d0895af791f8fe6a8cbb5cc2a89e99e8c1aa7e4d5bda4cb87d0b Miraielf mirai
http://176.65.134.5/jklarcfb1458decd00d0895af791f8fe6a8cbb5cc2a89e99e8c1aa7e4d5bda4cb87d0b Miraielf

Intelligence


File Origin
# of uploads :
1
# of downloads :
114
Origin country :
DE DE
Vendor Threat Intelligence
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
bash busybox evasive lolbin
Result
Verdict:
UNKNOWN
Threat name:
Document-HTML.Trojan.Multiverze
Status:
Malicious
First seen:
2025-03-10 22:22:17 UTC
File Type:
Text (Shell)
AV detection:
15 of 24 (62.50%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:mirai botnet:botnet botnet credential_access defense_evasion discovery linux
Behaviour
Reads runtime system information
System Network Configuration Discovery
Writes file to tmp directory
Changes its process name
Reads system network configuration
Reads process memory
Enumerates active TCP sockets
Enumerates running processes
File and Directory Permissions Modification
Executes dropped EXE
Modifies Watchdog functionality
Renames itself
Unexpected DNS network traffic destination
Contacts a large (105128) amount of remote hosts
Creates a large amount of network flows
Mirai
Mirai family
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh 8dcc3e92c112fb94931bd86055dc51f74a70007c058d1571a4eaec583a0852c0

(this sample)

  
Delivery method
Distributed via web download

Comments