MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 9b2c9bb39f43c04de7f8b55d029b412418a23d6991936be1098370d574b726ab. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: 9b2c9bb39f43c04de7f8b55d029b412418a23d6991936be1098370d574b726ab
SHA3-384 hash: 8b2f797bbc5a87fcc166cdde468a8ca3305a7e7b991ed8ab9910221290af1c3b7e7e2aa7bbc6171ae1aafef64b089ec1
SHA1 hash: 9a072c721cffe5a80a0dce2ff7122c8c346e78e3
MD5 hash: 1fdb019eef37223a8849f6016b6bdf7d
humanhash: solar-asparagus-iowa-idaho
File name:buf
Download: download sample
Signature Mirai
File size:669 bytes
First seen:2025-02-16 20:17:23 UTC
Last seen:Never
File type: sh
MIME type:text/plain
ssdeep 6:LdDrWgrzSA2mw2ezgtuWgrzSxjvwT+iLjG9WgrzSQHg0Mw1tLtQ6WgrzSeaLU+6y:Ij2em5kT+HRJQiaLBHTyvNITt9DvTW8
TLSH T1E20167AD042BFF43C04C6F5B7566B17BB23182EC405B8BC4AFC510EC944D953A275E51
Magika txt
Reporter abuse_ch
Tags:mirai sh
URLMalware sample (SHA256 hash)SignatureTags
http://193.143.1.32/splmips46894ab0365d99a0bb377497478ebabe75c295d6119ab5dce7c7c1ea90086efa Miraielf gafgyt mirai ua-wget
http://193.143.1.32/splmpslf135cf3046be829d6f1b7ef020c5dd9eca385aed561d782f8b4d03220a2a833d Miraielf gafgyt mirai ua-wget
http://193.143.1.32/splarm0c173caa930b8d384c6ae942987c9c0f51371f12f585a0e34d3b4e13d89f5b5b Miraielf mirai ua-wget
http://193.143.1.32/splarm5c7bf13560d86a03a4b2d614105f2f45340652ebaad205c82194af27448b9b8ff Miraielf mirai ua-wget
http://193.143.1.32/splarm6f2128b77af9e414b09f8427f9b1efee438971b7a99478031cb81eb99df1831e1 Miraielf mirai ua-wget
http://193.143.1.32/splarm78312daded7f34a6803e7ed28ad921c93020cb2c865d669bb4a528e7a9c94ee01 Miraielf mirai ua-wget

Intelligence


File Origin
# of uploads :
1
# of downloads :
97
Origin country :
DE DE
Vendor Threat Intelligence
Result
Verdict:
UNKNOWN
Threat name:
Linux.Downloader.Generic
Status:
Suspicious
First seen:
2025-02-16 20:22:38 UTC
File Type:
Text (Shell)
AV detection:
11 of 37 (29.73%)
Threat level:
  3/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
discovery
Behaviour
Modifies registry class
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
System Location Discovery: System Language Discovery
System Network Configuration Discovery: Internet Connection Discovery
Downloads MZ/PE file
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh 9b2c9bb39f43c04de7f8b55d029b412418a23d6991936be1098370d574b726ab

(this sample)

Comments