MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 a8351908d880663292edaf0f4a0be9264796cedaceb74ffa60fe4c00e90e9e0d. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: a8351908d880663292edaf0f4a0be9264796cedaceb74ffa60fe4c00e90e9e0d
SHA3-384 hash: 22cf73e1b2929545fba23dbd4011b8e60208085fe7e19435506fc5ba0f8f81714b4f7ccdfb7457b6e61cc48a9ffd3062
SHA1 hash: ff5d6fdfe03363acdf231d013b685dbd8d0d60fc
MD5 hash: 441d8ecd6628238591f9dbf7cb435cce
humanhash: magnesium-fruit-arkansas-oranges
File name:bob
Download: download sample
Signature Mirai
File size:405 bytes
First seen:2025-09-09 06:17:28 UTC
Last seen:Never
File type: sh
MIME type:text/plain
ssdeep 6:5D8sd4VUWjqzKEsd4oU/qQdsd0hSMmLCsd0UfUJm1sd03eIKCmh:5nd4Wmjd4o/Qud08LLtd0UcoGd03lK5h
TLSH T19AE0E5AD5233E0B74C3B4F0075A19714B909A2A231638F29EA9559239CCCB21B598F6E
Magika txt
Reporter abuse_ch
Tags:sh
URLMalware sample (SHA256 hash)SignatureTags
http://160.250.134.48/skid.mipsfd75057993af111cf29aeb0924554d01ad28c071fb20cf9700831fd4402fbaf2 Miraielf mirai ua-wget
http://160.250.134.48/skid.mpslfc2117cb6a4433fc0a3711ce912f4a1794741dfe467cf7c64ac9250e125b927c Miraielf mirai ua-wget
http://160.250.134.48/skid.arme16a5e543be159372994cf2bd528b703cfc4ebe667e153a34de20e13de0bc265 Miraielf mirai ua-wget
http://160.250.134.48/skid.arm5ef0759560923799625dbffbc95e23935d0c09da4aad0e7e285a24510c1255a97 Miraielf mirai ua-wget
http://160.250.134.48/skid.arm76509f8d5312e74b83dcc973477b33d6a439bc050545d2bc54962f9b43d8ddf88 Miraielf mirai ua-wget

Intelligence


File Origin
# of uploads :
1
# of downloads :
31
Origin country :
DE DE
Vendor Threat Intelligence
Verdict:
Malicious
File Type:
text
First seen:
2025-09-09T05:27:00Z UTC
Last seen:
2025-09-09T05:27:00Z UTC
Hits:
~10
Threat name:
Document-HTML.Downloader.Heuristic
Status:
Malicious
First seen:
2025-09-09 05:59:55 UTC
File Type:
Text (Shell)
AV detection:
11 of 38 (28.95%)
Threat level:
  2/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Modifies registry class
Suspicious use of SetWindowsHookEx
Enumerates physical storage devices
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh a8351908d880663292edaf0f4a0be9264796cedaceb74ffa60fe4c00e90e9e0d

(this sample)

  
Delivery method
Distributed via web download

Comments