MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 c5e57de6be03d75eba3e9aeab131829a353b660d0dbcbcec8e542203994840cc. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 8


Intelligence 8 IOCs YARA 1 File information Comments

SHA256 hash: c5e57de6be03d75eba3e9aeab131829a353b660d0dbcbcec8e542203994840cc
SHA3-384 hash: 68bd1da04664cecfffc292d0216ce66c9d55fb173babc39dcd92e0c72f8adc0805d86fa11644972f9586164e7bef0ab4
SHA1 hash: 9cb0859d6f0e634dd42a053f3a672e42579aa74f
MD5 hash: 6fc370abb4840bbef39dd08790560195
humanhash: mobile-juliet-mars-oranges
File name:weed
Download: download sample
Signature Mirai
File size:4'621 bytes
First seen:2025-02-04 17:11:34 UTC
Last seen:2025-02-09 14:41:02 UTC
File type: sh
MIME type:text/plain
ssdeep 48:1tLOBLGmLxRdL6GLqYqLtDL6NtA15iNyUFRhO0uYgZHONNJRfCYhNirwu2QrzO51:1xwhxLPZc56k54FFzTFgdOBX70AVTFv
TLSH T17191218C3F614B3A0D12DF9DF2228AA2745BD4C709914FE964ED70BCE8FEC44A52154B
Magika shell
Reporter abuse_ch
Tags:Hailbot sh
URLMalware sample (SHA256 hash)SignatureTags
http://103.188.83.11/mips4bdcfa4fdf3a5973f0769c3c3f91a884c0ffc5864c9899bd7ee11be95247e479 Mirai404 censys elf mirai
http://103.188.83.11/mpsl3d19066949ebfd287907986918e5eedbd812612939010006fc6d8b0f17b9c69e Mirai404 censys elf mirai
http://103.188.83.11/x86ce5797cd8b13c2f33236d3a9a3bc06cd8812b418b8b52d8bc48de1d851c5bd4b Mirai404 censys elf mirai
http://103.188.83.11/arm4b05c179f2de94587825897a488435e73ccb35b635ba835e696186d0c64d6baac Mirai404 censys elf mirai
http://103.188.83.11/arm51f2104c71f9224fb0fe7a16fd4d23f1e4ac4a7c515f23d0313361844b58fd9e8 Mirai404 censys elf mirai
http://103.188.83.11/arm64852934e3236386fdfd9c06d744a470061d32c03fe747cb25af20473b6b971d3 Mirai404 censys elf mirai
http://103.188.83.11/arm7d1d4cbbd012a7f0e277c8f0b282deed56cb5dea53897f9c415c8f71862fcb38c Mirai404 censys elf mirai
ftp://3.188.83.11:8021/mipsn/an/an/a
ftp://3.188.83.11:8021/mpsln/an/an/a
ftp://3.188.83.11:8021/x86n/an/an/a
ftp://3.188.83.11:8021/arm4n/an/an/a
ftp://3.188.83.11:8021/arm5n/an/an/a
ftp://3.188.83.11:8021/arm7n/an/an/a
ftp://3.188.83.11:8021/arm6n/an/an/a

Intelligence


File Origin
# of uploads :
2
# of downloads :
85
Origin country :
DE DE
Vendor Threat Intelligence
Verdict:
Malicious
Score:
99.1%
Tags:
medusa agent virus
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
busybox lolbin remote
Result
Verdict:
MALICIOUS
Threat name:
Win32.Trojan.Generic
Status:
Malicious
First seen:
2025-02-04 18:30:13 UTC
File Type:
Text (Shell)
AV detection:
13 of 24 (54.17%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
discovery
Behaviour
Modifies registry class
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:ach_202412_sh_hailbot
Author:abuse.ch
Description:Detects HailBot shell scripts

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh c5e57de6be03d75eba3e9aeab131829a353b660d0dbcbcec8e542203994840cc

(this sample)

  
Delivery method
Distributed via web download

Comments