MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 bb8e1fc0ee745662ad2620fbca1ff84b07761cb0d1d1e412bc48579c8419b138. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: bb8e1fc0ee745662ad2620fbca1ff84b07761cb0d1d1e412bc48579c8419b138
SHA3-384 hash: 26c7e0121530d74f7ab4d8578f0d63ab740a4a87e21d3f0c29de146c765ce3119124446cb40eaa2eeef806371d383618
SHA1 hash: a9a6419de5fd618f88dce1b7d3cdec1be36d7ac1
MD5 hash: b58ba07be8303485152b51892a899f05
humanhash: fillet-early-comet-comet
File name:q
Download: download sample
Signature Mirai
File size:4'905 bytes
First seen:2025-12-15 00:53:35 UTC
Last seen:Never
File type: sh
MIME type:text/plain
ssdeep 48:1tLXBLLsLHZdLhGLjwqLSDLpXpr4xRbN/SjZh10fwgWHdXok1Z8rwuQXORsmY3LL:1x16HjuccYpXCR5Kj7mIgYdXzllXeZuh
TLSH T1F5A115D9BCB15777CEF09E2DF6A54A7B2081E294AC76DF94E41D30BCB4ABD44B200905
Magika shell
Reporter abuse_ch
Tags:mirai sh
URLMalware sample (SHA256 hash)SignatureTags
http://158.94.208.162/z/89/mips1ef86f38b7e44a7511f09e4bec9a1da105e70db6d522467ac14b4ea42df632c9 Miraielf mirai ua-wget
http://158.94.208.162/z/89/mpslb3af651dbf2ffce881ed5539fcb7a3371f94f301eb4f7ac757d6aba63e5e1038 Miraielf mirai ua-wget
http://158.94.208.162/z/89/x86_649c033cf8304f0ed83cbba11c153b4fa29d766a90e57b1e8b715b9d25ef05ed76 Miraielf mirai ua-wget
http://158.94.208.162/z/89/arm4n/an/aelf ua-wget
http://158.94.208.162/z/89/arm571ecf29f0548ecb0051046067bf46b3966c596a554bde739db08900b38198918 Miraielf mirai ua-wget
http://158.94.208.162/z/89/arm628d8a15cfb38b9e56722fac60e7b53c84f53fcd678a62f67e82312be67b88bd7 Miraielf mirai ua-wget
http://158.94.208.162/z/89/arm78730e029d0f40e909494760198bd41b3a6aa44843a8968910cff20dea0fc35ca Miraielf mirai ua-wget

Intelligence


File Origin
# of uploads :
1
# of downloads :
38
Origin country :
DE DE
Vendor Threat Intelligence
No detections
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
busybox medusa mirai
Verdict:
Malicious
File Type:
text
First seen:
2025-12-14T16:55:00Z UTC
Last seen:
2025-12-16T08:34:00Z UTC
Hits:
~10
Threat name:
Linux.Downloader.Medusa
Status:
Malicious
First seen:
2025-12-15 01:21:16 UTC
File Type:
Text (Shell)
AV detection:
12 of 23 (52.17%)
Threat level:
  3/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Modifies registry class
Suspicious use of SetWindowsHookEx
Enumerates physical storage devices
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh bb8e1fc0ee745662ad2620fbca1ff84b07761cb0d1d1e412bc48579c8419b138

(this sample)

  
Delivery method
Distributed via web download

Comments