MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 b3ef77492751b0051fc092f9c1fa464eb3627c5e2f66990f1314098de33a7ac0. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: b3ef77492751b0051fc092f9c1fa464eb3627c5e2f66990f1314098de33a7ac0
SHA3-384 hash: 28d607d82558c22df27687c55e878d8cfb8f88848e8ec8011b8ca1aff5d76ca6770893e5544ce907f8c08c409352b938
SHA1 hash: 23fa552d28f2cbadf4f4d60421858be887f8d4c7
MD5 hash: 1cee4c1a01bef0900001f41d135bf09c
humanhash: october-may-connecticut-timing
File name:vbn
Download: download sample
Signature Mirai
File size:612 bytes
First seen:2025-12-05 18:21:13 UTC
Last seen:Never
File type: sh
MIME type:text/plain
ssdeep 12:6hAFlphMQOphQphlaLB9DphSNITBOphf+Zn:IA/XMQOXQXlaLB9DXSNItOX2Zn
TLSH T144F081FD4025FF16C5482E4F7659783E507A47CE40A7DBC46DCCB42E72A45A07322D08
Magika batch
Reporter abuse_ch
Tags:sh
URLMalware sample (SHA256 hash)SignatureTags
http://213.209.143.64/splmips633397cf2ca1b26757c7f32fe2e980ea66f783becff9455e11ded00b20032417 Miraielf mirai ua-wget
http://213.209.143.64/splmpsl61d0e0c8b1e9fdf341c8bbaacc50fe6cc5c5f73d4b7cb0f80808e6fedbf70d3c Miraielf mirai ua-wget
http://213.209.143.64/splarm7d879b6d1a523fc7b10eec5dec0ebcd1b8068317a7d3633522ce439cc33f7aec Miraielf mirai ua-wget
http://213.209.143.64/splarm54c5fa8a02e9565a932998d71e214a1307efce9f619aa344771780899f5a81aae Miraielf mirai ua-wget
http://213.209.143.64/splarm62fb9451a89a7ff854b1e2669f3be8b8d0829d40165490c78daf19aad4c927bb5 Miraielf mirai ua-wget
http://213.209.143.64/splarm7bbe9f2fbdcbdbc2571b15610d4f09c1553128665024b8c87fa973a21267e5941 Miraicensys elf mirai ua-wget

Intelligence


File Origin
# of uploads :
1
# of downloads :
14
Origin country :
DE DE
Vendor Threat Intelligence
No detections
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
busybox evasive mirai
Verdict:
Malicious
File Type:
text
First seen:
2025-12-05T20:54:00Z UTC
Last seen:
2025-12-06T02:00:00Z UTC
Hits:
~10
Threat name:
Script-Shell.Downloader.Heuristic
Status:
Malicious
First seen:
2025-12-05 18:31:19 UTC
File Type:
Text (Shell)
AV detection:
11 of 38 (28.95%)
Threat level:
  2/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Modifies registry class
Suspicious use of SetWindowsHookEx
Enumerates physical storage devices
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh b3ef77492751b0051fc092f9c1fa464eb3627c5e2f66990f1314098de33a7ac0

(this sample)

  
Delivery method
Distributed via web download

Comments