MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 d2954876a80595767f88e089739e3136ad148c0dadb1388458f0ffc746a88403. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: d2954876a80595767f88e089739e3136ad148c0dadb1388458f0ffc746a88403
SHA3-384 hash: 4d5d84c6390391ed149dfb341e68b4c196cd4bf7b40b4cdab28f0c0640013301ff9b94ab6a5f008c89c0353fb84d35ce
SHA1 hash: 6051966891f0c1cf499dbeedaf1935e054b92551
MD5 hash: 1c7ccae14572168f8b33e127c9b1697e
humanhash: earth-lactose-neptune-wolfram
File name:mob.sh
Download: download sample
Signature Mirai
File size:325 bytes
First seen:2025-12-05 18:22:42 UTC
Last seen:Never
File type: sh
MIME type:text/plain
ssdeep 6:LA5/rHzCa8FgA5/laLaNgX8FgA5/pFGNIvF+6L8FgA5/nfiAK6iyaJ:shfn8FthlaLaNgX8FthSNIE6L8FthfLa
TLSH T112E0C87D0017CF1FC1124D04E43660733033D7D55060CE069DC5503D61585207135E05
Magika txt
Reporter abuse_ch
Tags:sh
URLMalware sample (SHA256 hash)SignatureTags
http://213.209.143.64/splarm7d879b6d1a523fc7b10eec5dec0ebcd1b8068317a7d3633522ce439cc33f7aec Miraielf mirai ua-wget
http://213.209.143.64/splarm54c5fa8a02e9565a932998d71e214a1307efce9f619aa344771780899f5a81aae Miraielf mirai ua-wget
http://213.209.143.64/splarm62fb9451a89a7ff854b1e2669f3be8b8d0829d40165490c78daf19aad4c927bb5 Miraielf mirai ua-wget
http://213.209.143.64/splarm7bbe9f2fbdcbdbc2571b15610d4f09c1553128665024b8c87fa973a21267e5941 Miraicensys elf mirai ua-wget

Intelligence


File Origin
# of uploads :
1
# of downloads :
31
Origin country :
DE DE
Vendor Threat Intelligence
No detections
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
mirai
Verdict:
Malicious
File Type:
text
First seen:
2025-12-05T16:50:00Z UTC
Last seen:
2025-12-07T12:32:00Z UTC
Hits:
~10
Status:
terminated
Behavior Graph:
%3 guuid=61266088-1a00-0000-5b46-f314480d0000 pid=3400 /usr/bin/sudo guuid=6530318b-1a00-0000-5b46-f314500d0000 pid=3408 /tmp/sample.bin guuid=61266088-1a00-0000-5b46-f314480d0000 pid=3400->guuid=6530318b-1a00-0000-5b46-f314500d0000 pid=3408 execve guuid=9e1c8d8b-1a00-0000-5b46-f314520d0000 pid=3410 /usr/bin/wget net send-data write-file guuid=6530318b-1a00-0000-5b46-f314500d0000 pid=3408->guuid=9e1c8d8b-1a00-0000-5b46-f314520d0000 pid=3410 execve guuid=5e244293-1a00-0000-5b46-f314660d0000 pid=3430 /usr/bin/chmod guuid=6530318b-1a00-0000-5b46-f314500d0000 pid=3408->guuid=5e244293-1a00-0000-5b46-f314660d0000 pid=3430 execve guuid=0f1b9c93-1a00-0000-5b46-f314680d0000 pid=3432 /usr/bin/dash guuid=6530318b-1a00-0000-5b46-f314500d0000 pid=3408->guuid=0f1b9c93-1a00-0000-5b46-f314680d0000 pid=3432 clone guuid=2fd02d94-1a00-0000-5b46-f3146b0d0000 pid=3435 /usr/bin/wget net send-data write-file guuid=6530318b-1a00-0000-5b46-f314500d0000 pid=3408->guuid=2fd02d94-1a00-0000-5b46-f3146b0d0000 pid=3435 execve guuid=9eb09499-1a00-0000-5b46-f3147b0d0000 pid=3451 /usr/bin/chmod guuid=6530318b-1a00-0000-5b46-f314500d0000 pid=3408->guuid=9eb09499-1a00-0000-5b46-f3147b0d0000 pid=3451 execve guuid=6a731e9a-1a00-0000-5b46-f3147d0d0000 pid=3453 /usr/bin/dash guuid=6530318b-1a00-0000-5b46-f314500d0000 pid=3408->guuid=6a731e9a-1a00-0000-5b46-f3147d0d0000 pid=3453 clone guuid=9e908e9c-1a00-0000-5b46-f314850d0000 pid=3461 /usr/bin/wget net send-data write-file guuid=6530318b-1a00-0000-5b46-f314500d0000 pid=3408->guuid=9e908e9c-1a00-0000-5b46-f314850d0000 pid=3461 execve guuid=f1317ea1-1a00-0000-5b46-f314910d0000 pid=3473 /usr/bin/chmod guuid=6530318b-1a00-0000-5b46-f314500d0000 pid=3408->guuid=f1317ea1-1a00-0000-5b46-f314910d0000 pid=3473 execve guuid=47a2b9a1-1a00-0000-5b46-f314930d0000 pid=3475 /usr/bin/dash guuid=6530318b-1a00-0000-5b46-f314500d0000 pid=3408->guuid=47a2b9a1-1a00-0000-5b46-f314930d0000 pid=3475 clone guuid=6e8543a2-1a00-0000-5b46-f314970d0000 pid=3479 /usr/bin/wget net send-data write-file guuid=6530318b-1a00-0000-5b46-f314500d0000 pid=3408->guuid=6e8543a2-1a00-0000-5b46-f314970d0000 pid=3479 execve guuid=7780eca6-1a00-0000-5b46-f314a40d0000 pid=3492 /usr/bin/chmod guuid=6530318b-1a00-0000-5b46-f314500d0000 pid=3408->guuid=7780eca6-1a00-0000-5b46-f314a40d0000 pid=3492 execve guuid=af7031a7-1a00-0000-5b46-f314a60d0000 pid=3494 /usr/bin/dash guuid=6530318b-1a00-0000-5b46-f314500d0000 pid=3408->guuid=af7031a7-1a00-0000-5b46-f314a60d0000 pid=3494 clone b3bc708e-8ccc-5219-9688-8bb7f25e7035 213.209.143.64:80 guuid=9e1c8d8b-1a00-0000-5b46-f314520d0000 pid=3410->b3bc708e-8ccc-5219-9688-8bb7f25e7035 send: 135B guuid=2fd02d94-1a00-0000-5b46-f3146b0d0000 pid=3435->b3bc708e-8ccc-5219-9688-8bb7f25e7035 send: 136B guuid=9e908e9c-1a00-0000-5b46-f314850d0000 pid=3461->b3bc708e-8ccc-5219-9688-8bb7f25e7035 send: 136B guuid=6e8543a2-1a00-0000-5b46-f314970d0000 pid=3479->b3bc708e-8ccc-5219-9688-8bb7f25e7035 send: 136B
Threat name:
Script.Trojan.Multiverze
Status:
Malicious
First seen:
2025-12-05 18:27:26 UTC
File Type:
Text (Shell)
AV detection:
12 of 38 (31.58%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Modifies registry class
Suspicious use of SetWindowsHookEx
Enumerates physical storage devices
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh d2954876a80595767f88e089739e3136ad148c0dadb1388458f0ffc746a88403

(this sample)

  
Delivery method
Distributed via web download

Comments