MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 cfc99805b5ae3e57bafe1fe154a24b795ccb2cce0a5cdb97089fdf37b7280476. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 4


Intelligence 4 IOCs YARA File information Comments

SHA256 hash: cfc99805b5ae3e57bafe1fe154a24b795ccb2cce0a5cdb97089fdf37b7280476
SHA3-384 hash: 1db7c6c6f52352fe8760cc217c9f4ab57bd22a7ac741bd5e2fb7f2d1e43eb65e736e378179defe9990654513f366b97c
SHA1 hash: 5b83c3ca1b6b677bd4ac9d8c7020a9be6b1c15be
MD5 hash: 5dcba8e1a20aac09effb21b60998d037
humanhash: utah-low-kansas-montana
File name:zxc.sh
Download: download sample
Signature Mirai
File size:573 bytes
First seen:2025-03-07 00:21:51 UTC
Last seen:Never
File type: sh
MIME type:text/plain
ssdeep 12:afWUj2etfWAkT+rfWVGfWRaLBHTyafW2NITt9SfWbTWknN:eWUj22WAkCrWVyWRaLBHTyeW2NIp92Wb
TLSH T17FF03CAD007AFE43C0ACEE167566F1B7B5308286104B1A4DFED9147CA88C911B274FD9
Magika shell
Reporter abuse_ch
Tags:sh
URLMalware sample (SHA256 hash)SignatureTags
http://176.65.134.5/splmips46894ab0365d99a0bb377497478ebabe75c295d6119ab5dce7c7c1ea90086efa Miraielf mirai
http://176.65.134.5/splmpslf135cf3046be829d6f1b7ef020c5dd9eca385aed561d782f8b4d03220a2a833d Miraielf mirai
http://176.65.134.5/splarm0c173caa930b8d384c6ae942987c9c0f51371f12f585a0e34d3b4e13d89f5b5b Miraielf mirai
http://176.65.134.5/splarm5c7bf13560d86a03a4b2d614105f2f45340652ebaad205c82194af27448b9b8ff Miraielf mirai
http://176.65.134.5/splarm6f2128b77af9e414b09f8427f9b1efee438971b7a99478031cb81eb99df1831e1 Miraielf mirai
http://176.65.134.5/splarm78312daded7f34a6803e7ed28ad921c93020cb2c865d669bb4a528e7a9c94ee01 Miraielf mirai

Intelligence


File Origin
# of uploads :
1
# of downloads :
148
Origin country :
DE DE
Vendor Threat Intelligence
Result
Verdict:
UNKNOWN
Threat name:
Linux.Trojan.Generic
Status:
Suspicious
First seen:
2025-03-07 00:22:11 UTC
File Type:
Text (Shell)
AV detection:
13 of 38 (34.21%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
discovery
Behaviour
Modifies registry class
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh cfc99805b5ae3e57bafe1fe154a24b795ccb2cce0a5cdb97089fdf37b7280476

(this sample)

  
Delivery method
Distributed via web download

Comments