MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 c8a08b5ab55d8720eac434638963ef147a19a801fe2f407a8fcf45565a4251d3. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: c8a08b5ab55d8720eac434638963ef147a19a801fe2f407a8fcf45565a4251d3
SHA3-384 hash: c51c7cc7017fb23a93c825009afe6b1ba474f6eefc732c8c5043a51f32fa65ccee4efe8e6574607468e93c7c0933a381
SHA1 hash: 3f20af55055ee291ff535189927ad4249bbb088b
MD5 hash: d8b95d8cd98734e7ba7393858d177eb8
humanhash: winner-item-carolina-sixteen
File name:t
Download: download sample
Signature Mirai
File size:4'758 bytes
First seen:2025-12-14 23:08:04 UTC
Last seen:2025-12-15 03:39:02 UTC
File type: sh
MIME type:text/plain
ssdeep 96:1xDiHRGecfopXAPnCjReqgbkdXJlDhXGb2P:MPXAPnCjReZQdXJnXGb2P
TLSH T1D1A107E979B11737CDE09D29F6958D7F2042C2C88C77EFA4E86C78BCB4ABD44A600904
Magika csv
Reporter abuse_ch
Tags:mirai sh
URLMalware sample (SHA256 hash)SignatureTags
http://158.94.208.162/z/89/mips1ef86f38b7e44a7511f09e4bec9a1da105e70db6d522467ac14b4ea42df632c9 Miraielf mirai ua-wget
http://158.94.208.162/z/89/mpslb3af651dbf2ffce881ed5539fcb7a3371f94f301eb4f7ac757d6aba63e5e1038 Miraielf mirai ua-wget
http://158.94.208.162/z/89/x86_649c033cf8304f0ed83cbba11c153b4fa29d766a90e57b1e8b715b9d25ef05ed76 Miraielf mirai ua-wget
http://158.94.208.162/z/89/arm4n/an/aelf ua-wget
http://158.94.208.162/z/89/arm571ecf29f0548ecb0051046067bf46b3966c596a554bde739db08900b38198918 Miraielf mirai ua-wget
http://158.94.208.162/z/89/arm628d8a15cfb38b9e56722fac60e7b53c84f53fcd678a62f67e82312be67b88bd7 Miraielf mirai ua-wget
http://158.94.208.162/z/89/arm78730e029d0f40e909494760198bd41b3a6aa44843a8968910cff20dea0fc35ca Miraielf mirai ua-wget

Intelligence


File Origin
# of uploads :
2
# of downloads :
38
Origin country :
DE DE
Vendor Threat Intelligence
No detections
Verdict:
Malicious
File Type:
text
First seen:
2025-12-14T16:55:00Z UTC
Last seen:
2025-12-16T08:34:00Z UTC
Hits:
~10
Threat name:
Linux.Downloader.Medusa
Status:
Malicious
First seen:
2025-12-14 23:10:08 UTC
File Type:
Text (Shell)
AV detection:
12 of 23 (52.17%)
Threat level:
  3/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Modifies registry class
Suspicious use of SetWindowsHookEx
Enumerates physical storage devices
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh c8a08b5ab55d8720eac434638963ef147a19a801fe2f407a8fcf45565a4251d3

(this sample)

  
Delivery method
Distributed via web download

Comments