MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 d3efad3481cbc1372b1d4a585e08717fdfc008fd4af74a4bef08cccc2ab99e82. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: d3efad3481cbc1372b1d4a585e08717fdfc008fd4af74a4bef08cccc2ab99e82
SHA3-384 hash: 206bbb0c44ee8179369b89ff4d22d294c96dae5e1cb60db8434d8425372224fd4691a3004effe0ee7b9976d591f5aa54
SHA1 hash: bd01ba99655b9f1de6a5eab9a993d7028fc354e6
MD5 hash: b262d7a545e204da87677c04c9b58f1b
humanhash: bluebird-london-green-item
File name:vnpon
Download: download sample
Signature Mirai
File size:157 bytes
First seen:2025-12-21 15:13:22 UTC
Last seen:2025-12-23 06:12:16 UTC
File type: sh
MIME type:text/plain
ssdeep 3:LxAjdVZVCONBzSa5Ap9lACgxAjdVZVb8NBzSa+ANjapLAv:L6VxyHg6VbkPj8G
TLSH T1C2C0809F10271941D004AE201052341AB151C5C235F00B0DDBCD2033F8CD500BB5CD14
Magika shell
Reporter abuse_ch
Tags:sh
URLMalware sample (SHA256 hash)SignatureTags
http://130.12.180.64/splmpsl5a8d30683a937ecf56f6e06cf1f9eb7c9de187e68b4ba1d214eae22a5f1e5bec Miraielf mirai ua-wget
http://130.12.180.64/splmips4a3b75e3f968337924dfc92ac11b62ec56ce5fd449e0e0d3e3dfd50273c9d3d6 Miraielf mirai ua-wget

Intelligence


File Origin
# of uploads :
3
# of downloads :
44
Origin country :
DE DE
Vendor Threat Intelligence
No detections
Verdict:
Malicious
File Type:
text
First seen:
2025-12-21T12:39:00Z UTC
Last seen:
2025-12-21T14:59:00Z UTC
Hits:
~10
Detections:
HEUR:Trojan-Downloader.Shell.Agent.p
Status:
terminated
Behavior Graph:
%3 guuid=383dd7c2-1900-0000-9a77-145d330d0000 pid=3379 /usr/bin/sudo guuid=1ded34c5-1900-0000-9a77-145d3a0d0000 pid=3386 /tmp/sample.bin guuid=383dd7c2-1900-0000-9a77-145d330d0000 pid=3379->guuid=1ded34c5-1900-0000-9a77-145d3a0d0000 pid=3386 execve guuid=363defc5-1900-0000-9a77-145d3b0d0000 pid=3387 /usr/bin/wget net send-data write-file guuid=1ded34c5-1900-0000-9a77-145d3a0d0000 pid=3386->guuid=363defc5-1900-0000-9a77-145d3b0d0000 pid=3387 execve guuid=f11959cd-1900-0000-9a77-145d530d0000 pid=3411 /usr/bin/chmod guuid=1ded34c5-1900-0000-9a77-145d3a0d0000 pid=3386->guuid=f11959cd-1900-0000-9a77-145d530d0000 pid=3411 execve guuid=f8d591cd-1900-0000-9a77-145d550d0000 pid=3413 /usr/bin/dash guuid=1ded34c5-1900-0000-9a77-145d3a0d0000 pid=3386->guuid=f8d591cd-1900-0000-9a77-145d550d0000 pid=3413 clone guuid=d0dd10ce-1900-0000-9a77-145d590d0000 pid=3417 /usr/bin/wget net send-data write-file guuid=1ded34c5-1900-0000-9a77-145d3a0d0000 pid=3386->guuid=d0dd10ce-1900-0000-9a77-145d590d0000 pid=3417 execve guuid=c5c03fd2-1900-0000-9a77-145d640d0000 pid=3428 /usr/bin/chmod guuid=1ded34c5-1900-0000-9a77-145d3a0d0000 pid=3386->guuid=c5c03fd2-1900-0000-9a77-145d640d0000 pid=3428 execve guuid=48dcabd2-1900-0000-9a77-145d660d0000 pid=3430 /usr/bin/dash guuid=1ded34c5-1900-0000-9a77-145d3a0d0000 pid=3386->guuid=48dcabd2-1900-0000-9a77-145d660d0000 pid=3430 clone f22fee75-ab34-540d-95fe-696883c6f4ad 130.12.180.64:80 guuid=363defc5-1900-0000-9a77-145d3b0d0000 pid=3387->f22fee75-ab34-540d-95fe-696883c6f4ad send: 135B guuid=d0dd10ce-1900-0000-9a77-145d590d0000 pid=3417->f22fee75-ab34-540d-95fe-696883c6f4ad send: 135B
Threat name:
Script-Shell.Downloader.Heuristic
Status:
Malicious
First seen:
2025-12-21 15:29:25 UTC
File Type:
Text (Shell)
AV detection:
3 of 24 (12.50%)
Threat level:
  2/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Modifies registry class
Suspicious use of SetWindowsHookEx
Enumerates physical storage devices
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh d3efad3481cbc1372b1d4a585e08717fdfc008fd4af74a4bef08cccc2ab99e82

(this sample)

  
Delivery method
Distributed via web download

Comments