MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 ac26f064be98e866a4dc16f4a46b5db06acb5696706c12c54642a204da250016. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: ac26f064be98e866a4dc16f4a46b5db06acb5696706c12c54642a204da250016
SHA3-384 hash: 1962529916aa3b55dfcb370ff7f37df4b52a5c2f68ed3809450cad59bd97a0be90e1ff558b4ee0a0c0f14674041d8f26
SHA1 hash: fa7784ceedcf08126d0f3c1d8649dcde0508e643
MD5 hash: 99a77652864f24dd4ddfd360f66e0d77
humanhash: queen-red-oxygen-football
File name:bah
Download: download sample
Signature Mirai
File size:174 bytes
First seen:2025-12-21 15:13:36 UTC
Last seen:Never
File type: sh
MIME type:text/plain
ssdeep 3:LxAjdVZVb8NBzSa+TSJa4TJvGBwVxAjdVZVCONBzSa5T69LwJvn:L6Vbk2QhJV6Vxj/hn
TLSH T194C0129F10162D81D00DAE6421A5385DE68086C65A320B89BAC92073A88D921B758E64
Magika txt
Reporter abuse_ch
Tags:sh
URLMalware sample (SHA256 hash)SignatureTags
http://130.12.180.64/splmips2928a4694f399990791e7d0c00cb21c7fe852654df493d541097b7ce85815ec5 Miraielf mirai ua-wget
http://130.12.180.64/splmpsl3cd8a62933ca2ee92f4a556c9d59ae1679070eec6343b38d6ef6f75cf5190ced Miraielf mirai ua-wget

Intelligence


File Origin
# of uploads :
1
# of downloads :
38
Origin country :
DE DE
Vendor Threat Intelligence
No detections
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
mirai
Verdict:
Malicious
File Type:
text
First seen:
2025-12-21T12:37:00Z UTC
Last seen:
2025-12-21T15:56:00Z UTC
Hits:
~10
Status:
terminated
Behavior Graph:
%3 guuid=43483e82-1f00-0000-40f7-46550a0a0000 pid=2570 /usr/bin/sudo guuid=c705b984-1f00-0000-40f7-4655110a0000 pid=2577 /tmp/sample.bin guuid=43483e82-1f00-0000-40f7-46550a0a0000 pid=2570->guuid=c705b984-1f00-0000-40f7-4655110a0000 pid=2577 execve guuid=c97cfd84-1f00-0000-40f7-4655130a0000 pid=2579 /usr/bin/wget net send-data guuid=c705b984-1f00-0000-40f7-4655110a0000 pid=2577->guuid=c97cfd84-1f00-0000-40f7-4655130a0000 pid=2579 execve f22fee75-ab34-540d-95fe-696883c6f4ad 130.12.180.64:80 guuid=c97cfd84-1f00-0000-40f7-4655130a0000 pid=2579->f22fee75-ab34-540d-95fe-696883c6f4ad send: 135B
Threat name:
Win32.Trojan.Sonbokli
Status:
Malicious
First seen:
2025-12-21 15:30:33 UTC
File Type:
Text (Shell)
AV detection:
6 of 24 (25.00%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Modifies registry class
Suspicious use of SetWindowsHookEx
Enumerates physical storage devices
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh ac26f064be98e866a4dc16f4a46b5db06acb5696706c12c54642a204da250016

(this sample)

  
Delivery method
Distributed via web download

Comments