MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 a112042b0af82cbf3dcde4d0764b9e4f5392d1df1db6d8bdd7bb8f1160ed1f9c. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: a112042b0af82cbf3dcde4d0764b9e4f5392d1df1db6d8bdd7bb8f1160ed1f9c
SHA3-384 hash: 0165cc1f04c787cece4eee44903a61e490d4afbbc6ff1112d013764d74b2300b277bc9675211291df0263c50bc2984e1
SHA1 hash: 075e287e26db2d6d6b51fd92153b82455678c8ef
MD5 hash: d9e00054bb02d3830a79aa4843aecbbf
humanhash: yellow-cola-alabama-yankee
File name:dvr
Download: download sample
Signature Mirai
File size:4'758 bytes
First seen:2025-12-10 08:14:51 UTC
Last seen:2025-12-11 07:07:47 UTC
File type: sh
MIME type:text/plain
ssdeep 96:1xAN8R9Rc2ogXjPwxARRVgqkMXy1SYXXofpfP:pTXjPwxARRyLMXyHXXofpfP
TLSH T116A1E8CA395033338D949D3DF2F58D1F2092D0C086364FA8AA5974FD76ABD44FA50EA9
Magika csv
Reporter abuse_ch
Tags:mirai sh
URLMalware sample (SHA256 hash)SignatureTags
http://92.112.125.172/z/89/mips67d14607625e9959f595650cae0dab34d9dbaed8baca79270c9aee9a5f8dab6f Miraielf mirai ua-wget
http://92.112.125.172/z/89/mpsld737b65bddabf106eb6642a551b2b4c848101ae57e00de37c9d9a2670a52f9d9 Miraielf mirai ua-wget
http://92.112.125.172/z/89/x86_6413d151f0910a9ec48ea9a1854ec4ed04c50b920673a2d963bcc7fa233d217126 Miraielf mirai ua-wget
http://92.112.125.172/z/89/arm4n/an/aelf ua-wget
http://92.112.125.172/z/89/arm571ecf29f0548ecb0051046067bf46b3966c596a554bde739db08900b38198918 Miraielf mirai ua-wget
http://92.112.125.172/z/89/arm65e40a628404e0381d24f344df4e0250f01e94137aa3f98602b631c71a5c329c1 Miraielf mirai ua-wget
http://92.112.125.172/z/89/arm72f220f990fa4b3dd2db426c36428a4a66a0a55fbbb98dc3b5f1fbc240f692002 Miraielf mirai ua-wget

Intelligence


File Origin
# of uploads :
3
# of downloads :
49
Origin country :
DE DE
Vendor Threat Intelligence
No detections
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
busybox medusa mirai
Verdict:
Malicious
File Type:
text
First seen:
2025-12-10T06:50:00Z UTC
Last seen:
2025-12-10T07:44:00Z UTC
Hits:
~10
Threat name:
Linux.Downloader.Medusa
Status:
Malicious
First seen:
2025-12-10 07:18:02 UTC
File Type:
Text (Shell)
AV detection:
13 of 24 (54.17%)
Threat level:
  3/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Modifies registry class
Suspicious use of SetWindowsHookEx
Enumerates physical storage devices
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh a112042b0af82cbf3dcde4d0764b9e4f5392d1df1db6d8bdd7bb8f1160ed1f9c

(this sample)

Comments