MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 b7d11cda9b9c4f108981c03ca3f6fdc4b67b77a374812f1e2ed9967e19dbcd91. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: b7d11cda9b9c4f108981c03ca3f6fdc4b67b77a374812f1e2ed9967e19dbcd91
SHA3-384 hash: c37b4c3908ef2b01363e79ebb2cc8bae1e7063ce8fb7aff1d92e5fc126785576cf1fda58a4f1eb6991c0eaaf7ce99020
SHA1 hash: 6d742ea5c5226093c1b0dd313ddbbd777d43d45c
MD5 hash: 17a421fa0db07b0dbf75f1952e5ccb2f
humanhash: wisconsin-neptune-texas-maine
File name:f
Download: download sample
Signature Mirai
File size:831 bytes
First seen:2025-12-06 22:34:43 UTC
Last seen:Never
File type: sh
MIME type:text/plain
ssdeep 24:Z+ZOBkRD3v6oYkRD3v688kRD3v6l5Dl5nkRD3v6aO9kRD3v6SmkRD3vXw:UZAkR+kRYkR6n9kRWkRmkRTw
TLSH T125015BFF004D96354E40894DB5A7892974338BEB90E5C60DA98DA527B389E2CB433E5C
Magika batch
Reporter abuse_ch
Tags:sh
URLMalware sample (SHA256 hash)SignatureTags
http://213.209.143.64/splmipsa14a4bdd8fbe5df29323e1a83629537f8bc9f6e905e52ae5f75b3ea1608ab001 Miraielf mirai ua-wget
http://213.209.143.64/splmpsle68a84f78ecbc3f02c3951dddb5a13f57ebe9401bd2ac2481c05b90b575045ec Miraielf mirai ua-wget
http://213.209.143.64/splarm96f1feeb93c3a7452740a6f7914e10411b7f8bbc90a9560f4788f3c4ac61c4d0 Miraielf mirai ua-wget
http://213.209.143.64/splarm52a9500af556d33ba63010baf25c7889f3820cfb3ae73bf1e8c9308c6687a3d86 Miraielf mirai ua-wget
http://213.209.143.64/splarm79fe549c71c620f6572f5c8815dea0d4401af11397444ada0cda8bd2b0fbc1efe Miraicensys elf mirai ua-wget
http://213.209.143.64/splarm6fa9c55993474f595798a26c92346219f18341bc7ac8ead9effa655a2db87a6fe Miraielf mirai ua-wget

Intelligence


File Origin
# of uploads :
1
# of downloads :
38
Origin country :
DE DE
Vendor Threat Intelligence
No detections
Verdict:
Malicious
File Type:
text
First seen:
2025-12-07T01:30:00Z UTC
Last seen:
2025-12-07T21:52:00Z UTC
Hits:
~10
Threat name:
Linux.Downloader.Generic
Status:
Suspicious
First seen:
2025-12-06 22:40:19 UTC
File Type:
Text (Shell)
AV detection:
10 of 36 (27.78%)
Threat level:
  3/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Modifies registry class
Suspicious use of SetWindowsHookEx
Enumerates physical storage devices
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh b7d11cda9b9c4f108981c03ca3f6fdc4b67b77a374812f1e2ed9967e19dbcd91

(this sample)

  
Delivery method
Distributed via web download

Comments