MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 9437f638d4151d1946da0db5d0c461ad5bd235b4fd0a08c3b8f9cbe4d5a3eb14. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: 9437f638d4151d1946da0db5d0c461ad5bd235b4fd0a08c3b8f9cbe4d5a3eb14
SHA3-384 hash: 721db205b342ccaeac6012caafcdf8739c81ab66dd41e66db9c26414ce0cf2f82635c831978df748004418c63e8dd1e4
SHA1 hash: 80050774b5ac28fbbff8297c96c13adf9681db94
MD5 hash: 804058fac9138c413b9e1c5ab646206d
humanhash: oscar-yankee-don-uniform
File name:cn
Download: download sample
Signature Mirai
File size:534 bytes
First seen:2025-02-04 02:11:44 UTC
Last seen:Never
File type: sh
MIME type:text/plain
ssdeep 6:Lh8VCbT/XBYCDhYKGTxXgXICDhfcji/DhaGxXjJDh+NIF+KyjBFIPDhOa6qXj2P:y4Ta3drqUGYNIbWeQ
TLSH T1D9F04F89D8533E96496CED2DF67B245EA052C7CCE10747CEBD890439C85DA55F838A84
Magika txt
Reporter abuse_ch
Tags:mirai sh
URLMalware sample (SHA256 hash)SignatureTags
http://94.156.167.35/mips4fc73b02bd0cc4d44ee8da03ce5ab8b74fb67409fb223c3f36b06dc22dc0dd74 Gafgytelf gafgyt ua-wget
http://94.156.167.35/mpsl18c99e6db38118a4d50a0bca8dd475f700d3ff172a73fb6a48bdd599d4abae95 Gafgytelf gafgyt ua-wget
http://94.156.167.35/arm2f66b28645b910c0fcb7a751e9a0dad86fd2be825d07f45dd6ab086ec2eeafc0 Miraielf mirai ua-wget
http://94.156.167.35/arm50b051fb3621726c4525a268f2bb2c12456cc238b0b301c249feb2872177ae517 Miraielf mirai ua-wget
http://94.156.167.35/arm60b051fb3621726c4525a268f2bb2c12456cc238b0b301c249feb2872177ae517 Miraielf
http://94.156.167.35/arm70eb5997a6d364d229c20d80912db30896e079cba3064033f3de3916cb2678045 Miraielf mirai ua-wget

Intelligence


File Origin
# of uploads :
1
# of downloads :
104
Origin country :
DE DE
Vendor Threat Intelligence
Verdict:
Malicious
Score:
99.9%
Tags:
trojan mirai agent virus
Result
Verdict:
UNKNOWN
Threat name:
Linux.Trojan.Generic
Status:
Suspicious
First seen:
2025-02-04 03:09:27 UTC
File Type:
Text (Shell)
AV detection:
14 of 24 (58.33%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
discovery
Behaviour
Modifies registry class
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh 9437f638d4151d1946da0db5d0c461ad5bd235b4fd0a08c3b8f9cbe4d5a3eb14

(this sample)

  
Delivery method
Distributed via web download

Comments