MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 9cca7909a0a5dd8563656be2c6cb99a105a23a7c4db916a3665f36ab7c71cbe3. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 8


Intelligence 8 IOCs YARA 1 File information Comments

SHA256 hash: 9cca7909a0a5dd8563656be2c6cb99a105a23a7c4db916a3665f36ab7c71cbe3
SHA3-384 hash: cd2bc99f860db7cc7b19de2f1da899063a29a286d7e98514b0c42305db6ee7a566ab093b0044e59fee746a4e9af98b1a
SHA1 hash: 8e9698c69e358cfe22821df551f69da99050e2e7
MD5 hash: 8e243eaac328186344cfcc981bd693bf
humanhash: lithium-robert-nuts-maine
File name:na
Download: download sample
Signature Mirai
File size:5'096 bytes
First seen:2024-03-13 14:50:25 UTC
Last seen:Never
File type: sh
MIME type:text/x-shellscript
ssdeep 24:aQPd/FEuA/FZKx/FQ3/FcT/F0Zd/FUSgP5/FAyG/FcB3/FQxVTvZ/FA7/FyBN/FY:1PkHKsaOZ0SgsyryTTvEQw3kBeB
TLSH T181B137C731DA877D1E694CA7F1B84B1DF0A090D068E1BEF6B5E8A674204DC483418F5E
Reporter abuse_ch
Tags:mirai sh

Intelligence


File Origin
# of uploads :
1
# of downloads :
109
Origin country :
DE DE
Vendor Threat Intelligence
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
coinminer mirai virus
Result
Verdict:
MALICIOUS
Threat name:
Linux.Trojan.Vigorf
Status:
Malicious
First seen:
2024-03-13 14:51:08 UTC
File Type:
Text (Shell)
AV detection:
10 of 24 (41.67%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:mirai antivm botnet linux
Behaviour
Reads runtime system information
Writes file to tmp directory
Checks CPU configuration
Enumerates running processes
Changes its process name
Executes dropped EXE
Mirai
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Linux_Shellscript_Downloader
Author:albertzsigovits
Description:Generic Approach to Shellscript downloaders

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh 9cca7909a0a5dd8563656be2c6cb99a105a23a7c4db916a3665f36ab7c71cbe3

(this sample)

  
Delivery method
Distributed via web download

Comments