MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 c38b76a4094ace73c67168c1459c9559e2766fb7c44a06113ed0b93360afb93b. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: c38b76a4094ace73c67168c1459c9559e2766fb7c44a06113ed0b93360afb93b
SHA3-384 hash: 80e615264ae78f0e4631323d76aecafefe75a5c21e9d07a60b8a1dd850db8bb2e36776a3b8dc87335e8f48b450ab47e3
SHA1 hash: 649a3a81af3c470c0020d6818516af3ec461c2d2
MD5 hash: 5b304f8ff365773c61e5d904c560be94
humanhash: indigo-asparagus-stream-cold
File name:q
Download: download sample
Signature Mirai
File size:4'905 bytes
First seen:2025-12-10 08:14:50 UTC
Last seen:2025-12-10 15:26:09 UTC
File type: sh
MIME type:text/plain
ssdeep 96:1x4v8jX5cpgXnRoLA7DdgVMXazXXlAfjfh:p7XnRoLA7DaVMXabXlAfjfh
TLSH T1D0A1F5C93D6033B38EA49E3DF2F54A2B20C2E0D0A1354F94660970FD75ABD45F610EA9
Magika shell
Reporter abuse_ch
Tags:mirai sh
URLMalware sample (SHA256 hash)SignatureTags
http://92.112.125.172/z/89/mips67d14607625e9959f595650cae0dab34d9dbaed8baca79270c9aee9a5f8dab6f Miraielf mirai ua-wget
http://92.112.125.172/z/89/mpsld737b65bddabf106eb6642a551b2b4c848101ae57e00de37c9d9a2670a52f9d9 Miraielf mirai ua-wget
http://92.112.125.172/z/89/x86_6413d151f0910a9ec48ea9a1854ec4ed04c50b920673a2d963bcc7fa233d217126 Miraielf mirai ua-wget
http://92.112.125.172/z/89/arm4n/an/aelf ua-wget
http://92.112.125.172/z/89/arm571ecf29f0548ecb0051046067bf46b3966c596a554bde739db08900b38198918 Miraielf mirai ua-wget
http://92.112.125.172/z/89/arm65e40a628404e0381d24f344df4e0250f01e94137aa3f98602b631c71a5c329c1 Miraielf mirai ua-wget
http://92.112.125.172/z/89/arm72f220f990fa4b3dd2db426c36428a4a66a0a55fbbb98dc3b5f1fbc240f692002 Miraielf mirai ua-wget

Intelligence


File Origin
# of uploads :
3
# of downloads :
48
Origin country :
DE DE
Vendor Threat Intelligence
No detections
Verdict:
Malicious
File Type:
text
First seen:
2025-12-10T06:58:00Z UTC
Last seen:
2025-12-10T09:42:00Z UTC
Hits:
~10
Threat name:
Linux.Downloader.Medusa
Status:
Malicious
First seen:
2025-12-10 07:17:45 UTC
File Type:
Text (Shell)
AV detection:
13 of 24 (54.17%)
Threat level:
  3/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Modifies registry class
Suspicious use of SetWindowsHookEx
Enumerates physical storage devices
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh c38b76a4094ace73c67168c1459c9559e2766fb7c44a06113ed0b93360afb93b

(this sample)

  
Delivery method
Distributed via web download

Comments