MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 ab1c6bb5a4216e2b1126a93367ccdf6f12f57284b666b7ab4e082e28bd75ac92. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 4


Intelligence 4 IOCs YARA File information Comments

SHA256 hash: ab1c6bb5a4216e2b1126a93367ccdf6f12f57284b666b7ab4e082e28bd75ac92
SHA3-384 hash: b41dc80135a5f2fc762c5a51ecbc628fcd20127467b89453ec5350a93e25de917fe20d4bd3f15d73b7c7d4bd37bd9319
SHA1 hash: 5bbb9517b8593a4a0aaf21a64d6f694452e52fb7
MD5 hash: 0526d8bd1bb05504115195e9948ea33b
humanhash: oven-queen-texas-queen
File name:o.xml
Download: download sample
Signature Mirai
File size:852 bytes
First seen:2025-10-01 05:40:25 UTC
Last seen:2025-10-01 11:05:13 UTC
File type: sh
MIME type:text/plain
ssdeep 12:FzY8id/7JAC7akxGWi2jX0KTkQp/Cjuo/mtx/Stx/9p/2/mwTEinv:FzY8k1/sWi2jkIp+uo4qv1pe7Th
TLSH T1E5016DED74FD8B885A8DC84AF2A025654099E58B62A58AF8F38E14287B44C2430129CF
Magika xml
Reporter abuse_ch
Tags:sh
URLMalware sample (SHA256 hash)SignatureTags
http://213.209.143.62/nwfaiehg4ewijfgriehgirehaughrarg.x86d88a78a5f16ad036e1befa5353881dfdb9123021fa336f857d3be95a3be93a57 Miraielf mirai

Intelligence


File Origin
# of uploads :
2
# of downloads :
52
Origin country :
DE DE
Vendor Threat Intelligence
Verdict:
Malicious
Labled as:
TrojanDownloader/Linux.NetLoader
Status:
terminated
Behavior Graph:
%3 guuid=5b8ad060-1900-0000-7414-cd195e140000 pid=5214 /usr/bin/sudo guuid=5ba63562-1900-0000-7414-cd195f140000 pid=5215 /tmp/sample.bin guuid=5b8ad060-1900-0000-7414-cd195e140000 pid=5214->guuid=5ba63562-1900-0000-7414-cd195f140000 pid=5215 execve guuid=20429d62-1900-0000-7414-cd1960140000 pid=5216 /usr/bin/dash guuid=5ba63562-1900-0000-7414-cd195f140000 pid=5215->guuid=20429d62-1900-0000-7414-cd1960140000 pid=5216 clone
Threat name:
Script-JS.Trojan.Heuristic
Status:
Malicious
First seen:
2025-10-01 06:14:20 UTC
File Type:
Text
AV detection:
8 of 38 (21.05%)
Threat level:
  2/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Modifies registry class
Suspicious use of SetWindowsHookEx
Enumerates physical storage devices
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh ab1c6bb5a4216e2b1126a93367ccdf6f12f57284b666b7ab4e082e28bd75ac92

(this sample)

  
Delivery method
Distributed via web download

Comments