MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 cfb1bfa7cad8b02e4133af67bb3e44259677d36ae1657470852c6ec80f994e4d. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: cfb1bfa7cad8b02e4133af67bb3e44259677d36ae1657470852c6ec80f994e4d
SHA3-384 hash: 3d5bf17d78ad9b2ec17e842c9b0aa04d772940f2527630cca5916ed9cbb8487ca12f31ceffc1b8a0c76bdde4b487168f
SHA1 hash: 6b5d402a6092a6eabde9f7dc5fcc63376e7d5ee7
MD5 hash: 62ba6b2d536421569dfd55ca81811392
humanhash: vegan-hot-table-nevada
File name:x
Download: download sample
Signature Mirai
File size:129 bytes
First seen:2025-12-21 15:14:34 UTC
Last seen:Never
File type: sh
MIME type:text/plain
ssdeep 3:haX+v1FWISNN3VZVMISNN3zSaDST63S4V/eXIFIX1ISIIFA:WGWv73VcfiD4EX4IX1vI4A
TLSH T1C5B0927A051BEF0380BC9E6A3AB1A43F74B567AC054B37886EC3409F40885C52278D12
Magika shell
Reporter abuse_ch
Tags:sh
URLMalware sample (SHA256 hash)SignatureTags
http://130.12.180.64/splarm77cc0c7d015dfef9d1917318d0ec9b7cb9d1bb80d8b2b0bff615814bc2a0726eb Miraielf mirai ua-wget

Intelligence


File Origin
# of uploads :
1
# of downloads :
38
Origin country :
DE DE
Vendor Threat Intelligence
No detections
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
evasive
Verdict:
Malicious
File Type:
text
First seen:
2025-12-21T13:47:00Z UTC
Last seen:
2025-12-21T15:02:00Z UTC
Hits:
~10
Status:
terminated
Behavior Graph:
%3 guuid=c80dd90e-1700-0000-e1f9-b84c460f0000 pid=3910 /usr/bin/sudo guuid=d178b411-1700-0000-e1f9-b84c530f0000 pid=3923 /tmp/sample.bin guuid=c80dd90e-1700-0000-e1f9-b84c460f0000 pid=3910->guuid=d178b411-1700-0000-e1f9-b84c530f0000 pid=3923 execve guuid=6bfafa11-1700-0000-e1f9-b84c540f0000 pid=3924 /usr/bin/rm guuid=d178b411-1700-0000-e1f9-b84c530f0000 pid=3923->guuid=6bfafa11-1700-0000-e1f9-b84c540f0000 pid=3924 execve guuid=116c5412-1700-0000-e1f9-b84c580f0000 pid=3928 /usr/bin/rm guuid=d178b411-1700-0000-e1f9-b84c530f0000 pid=3923->guuid=116c5412-1700-0000-e1f9-b84c580f0000 pid=3928 execve guuid=aaa1a512-1700-0000-e1f9-b84c590f0000 pid=3929 /usr/bin/wget net send-data write-file guuid=d178b411-1700-0000-e1f9-b84c530f0000 pid=3923->guuid=aaa1a512-1700-0000-e1f9-b84c590f0000 pid=3929 execve guuid=f4bace18-1700-0000-e1f9-b84c6b0f0000 pid=3947 /usr/bin/chmod guuid=d178b411-1700-0000-e1f9-b84c530f0000 pid=3923->guuid=f4bace18-1700-0000-e1f9-b84c6b0f0000 pid=3947 execve guuid=2f114a19-1700-0000-e1f9-b84c6c0f0000 pid=3948 /usr/bin/dash guuid=d178b411-1700-0000-e1f9-b84c530f0000 pid=3923->guuid=2f114a19-1700-0000-e1f9-b84c6c0f0000 pid=3948 clone guuid=4e78ff19-1700-0000-e1f9-b84c730f0000 pid=3955 /usr/bin/rm delete-file guuid=d178b411-1700-0000-e1f9-b84c530f0000 pid=3923->guuid=4e78ff19-1700-0000-e1f9-b84c730f0000 pid=3955 execve guuid=34b0541a-1700-0000-e1f9-b84c750f0000 pid=3957 /usr/bin/rm guuid=d178b411-1700-0000-e1f9-b84c530f0000 pid=3923->guuid=34b0541a-1700-0000-e1f9-b84c750f0000 pid=3957 execve f22fee75-ab34-540d-95fe-696883c6f4ad 130.12.180.64:80 guuid=aaa1a512-1700-0000-e1f9-b84c590f0000 pid=3929->f22fee75-ab34-540d-95fe-696883c6f4ad send: 135B
Threat name:
Text.Browser.Generic
Status:
Suspicious
First seen:
2025-12-21 15:37:16 UTC
File Type:
Text (Shell)
AV detection:
2 of 24 (8.33%)
Threat level:
  4/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Modifies registry class
Suspicious use of SetWindowsHookEx
Enumerates physical storage devices
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh cfb1bfa7cad8b02e4133af67bb3e44259677d36ae1657470852c6ec80f994e4d

(this sample)

  
Delivery method
Distributed via web download

Comments