MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 b7da03112af2b1691fd1685d494cbb5a447a9231f724102dfa85c5fdde1078c6. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: b7da03112af2b1691fd1685d494cbb5a447a9231f724102dfa85c5fdde1078c6
SHA3-384 hash: 7f809c52f6fd9a0b3a9de7d5133c895bbc7ea97ab3fa9d241c9207f147ee3e241d1b611031de7ea9c946285b5974b190
SHA1 hash: 339b6388a074ec64a576a7302b70edac2999a662
MD5 hash: 08b4f60f11ff9ceb4d846d533e3ef1a3
humanhash: magazine-carbon-kitten-earth
File name:sony.sh
Download: download sample
Signature Mirai
File size:390 bytes
First seen:2025-12-05 18:22:36 UTC
Last seen:Never
File type: sh
MIME type:text/plain
ssdeep 12:shfcJVzthXjzOzthlaLaNgIzthSNIE6szthfLK63n:efkVPXjzOPlaLaNgIPSNILsPDK63
TLSH T18BE075BD006BDF57C5589D15B06B6873B032DBDBA1A1CE0AAEC4A436A198D307233E65
Magika batch
Reporter abuse_ch
Tags:sh
URLMalware sample (SHA256 hash)SignatureTags
http://213.209.143.64/splarm7d879b6d1a523fc7b10eec5dec0ebcd1b8068317a7d3633522ce439cc33f7aec Miraielf mirai ua-wget
http://213.209.143.64/splarm4n/an/aelf ua-wget
http://213.209.143.64/splarm54c5fa8a02e9565a932998d71e214a1307efce9f619aa344771780899f5a81aae Miraielf mirai ua-wget
http://213.209.143.64/splarm62fb9451a89a7ff854b1e2669f3be8b8d0829d40165490c78daf19aad4c927bb5 Miraielf mirai ua-wget
http://213.209.143.64/splarm7bbe9f2fbdcbdbc2571b15610d4f09c1553128665024b8c87fa973a21267e5941 Miraicensys elf mirai ua-wget

Intelligence


File Origin
# of uploads :
1
# of downloads :
30
Origin country :
DE DE
Vendor Threat Intelligence
No detections
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
mirai
Verdict:
Malicious
File Type:
text
First seen:
2025-12-05T16:50:00Z UTC
Last seen:
2025-12-06T14:36:00Z UTC
Hits:
~10
Status:
terminated
Behavior Graph:
%3 guuid=5bbdb70a-2000-0000-4496-88bd6e0c0000 pid=3182 /usr/bin/sudo guuid=a8c9d10c-2000-0000-4496-88bd720c0000 pid=3186 /tmp/sample.bin guuid=5bbdb70a-2000-0000-4496-88bd6e0c0000 pid=3182->guuid=a8c9d10c-2000-0000-4496-88bd720c0000 pid=3186 execve guuid=92740a0d-2000-0000-4496-88bd730c0000 pid=3187 /usr/bin/wget net send-data write-file guuid=a8c9d10c-2000-0000-4496-88bd720c0000 pid=3186->guuid=92740a0d-2000-0000-4496-88bd730c0000 pid=3187 execve guuid=e2707b13-2000-0000-4496-88bd800c0000 pid=3200 /usr/bin/chmod guuid=a8c9d10c-2000-0000-4496-88bd720c0000 pid=3186->guuid=e2707b13-2000-0000-4496-88bd800c0000 pid=3200 execve guuid=3946b313-2000-0000-4496-88bd820c0000 pid=3202 /usr/bin/dash guuid=a8c9d10c-2000-0000-4496-88bd720c0000 pid=3186->guuid=3946b313-2000-0000-4496-88bd820c0000 pid=3202 clone guuid=9eaf0115-2000-0000-4496-88bd840c0000 pid=3204 /usr/bin/wget net send-data guuid=a8c9d10c-2000-0000-4496-88bd720c0000 pid=3186->guuid=9eaf0115-2000-0000-4496-88bd840c0000 pid=3204 execve guuid=5afcbf17-2000-0000-4496-88bd8a0c0000 pid=3210 /usr/bin/chmod guuid=a8c9d10c-2000-0000-4496-88bd720c0000 pid=3186->guuid=5afcbf17-2000-0000-4496-88bd8a0c0000 pid=3210 execve guuid=1d310518-2000-0000-4496-88bd8c0c0000 pid=3212 /usr/bin/dash guuid=a8c9d10c-2000-0000-4496-88bd720c0000 pid=3186->guuid=1d310518-2000-0000-4496-88bd8c0c0000 pid=3212 clone guuid=aec81318-2000-0000-4496-88bd8d0c0000 pid=3213 /usr/bin/wget net send-data write-file guuid=a8c9d10c-2000-0000-4496-88bd720c0000 pid=3186->guuid=aec81318-2000-0000-4496-88bd8d0c0000 pid=3213 execve guuid=16e7c41c-2000-0000-4496-88bd920c0000 pid=3218 /usr/bin/chmod guuid=a8c9d10c-2000-0000-4496-88bd720c0000 pid=3186->guuid=16e7c41c-2000-0000-4496-88bd920c0000 pid=3218 execve guuid=96e43a1d-2000-0000-4496-88bd930c0000 pid=3219 /usr/bin/dash guuid=a8c9d10c-2000-0000-4496-88bd720c0000 pid=3186->guuid=96e43a1d-2000-0000-4496-88bd930c0000 pid=3219 clone guuid=7ab6461f-2000-0000-4496-88bd950c0000 pid=3221 /usr/bin/wget net send-data write-file guuid=a8c9d10c-2000-0000-4496-88bd720c0000 pid=3186->guuid=7ab6461f-2000-0000-4496-88bd950c0000 pid=3221 execve guuid=5ff8bb24-2000-0000-4496-88bd960c0000 pid=3222 /usr/bin/chmod guuid=a8c9d10c-2000-0000-4496-88bd720c0000 pid=3186->guuid=5ff8bb24-2000-0000-4496-88bd960c0000 pid=3222 execve guuid=fb543f25-2000-0000-4496-88bd970c0000 pid=3223 /usr/bin/dash guuid=a8c9d10c-2000-0000-4496-88bd720c0000 pid=3186->guuid=fb543f25-2000-0000-4496-88bd970c0000 pid=3223 clone guuid=dbd63c26-2000-0000-4496-88bd990c0000 pid=3225 /usr/bin/wget net send-data write-file guuid=a8c9d10c-2000-0000-4496-88bd720c0000 pid=3186->guuid=dbd63c26-2000-0000-4496-88bd990c0000 pid=3225 execve guuid=7263932b-2000-0000-4496-88bd9a0c0000 pid=3226 /usr/bin/chmod guuid=a8c9d10c-2000-0000-4496-88bd720c0000 pid=3186->guuid=7263932b-2000-0000-4496-88bd9a0c0000 pid=3226 execve guuid=3215fb2b-2000-0000-4496-88bd9b0c0000 pid=3227 /usr/bin/dash guuid=a8c9d10c-2000-0000-4496-88bd720c0000 pid=3186->guuid=3215fb2b-2000-0000-4496-88bd9b0c0000 pid=3227 clone b3bc708e-8ccc-5219-9688-8bb7f25e7035 213.209.143.64:80 guuid=92740a0d-2000-0000-4496-88bd730c0000 pid=3187->b3bc708e-8ccc-5219-9688-8bb7f25e7035 send: 135B guuid=9eaf0115-2000-0000-4496-88bd840c0000 pid=3204->b3bc708e-8ccc-5219-9688-8bb7f25e7035 send: 136B guuid=aec81318-2000-0000-4496-88bd8d0c0000 pid=3213->b3bc708e-8ccc-5219-9688-8bb7f25e7035 send: 136B guuid=7ab6461f-2000-0000-4496-88bd950c0000 pid=3221->b3bc708e-8ccc-5219-9688-8bb7f25e7035 send: 136B guuid=dbd63c26-2000-0000-4496-88bd990c0000 pid=3225->b3bc708e-8ccc-5219-9688-8bb7f25e7035 send: 136B
Threat name:
Document-HTML.Trojan.Heuristic
Status:
Malicious
First seen:
2025-12-05 18:26:25 UTC
File Type:
Text (Shell)
AV detection:
10 of 38 (26.32%)
Threat level:
  2/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Modifies registry class
Suspicious use of SetWindowsHookEx
Enumerates physical storage devices
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh b7da03112af2b1691fd1685d494cbb5a447a9231f724102dfa85c5fdde1078c6

(this sample)

  
Delivery method
Distributed via web download

Comments