MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 d60841b76c5acbd5419e959c40183b223b212dc3f9f3c56dfcf5d079aad3df16. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: d60841b76c5acbd5419e959c40183b223b212dc3f9f3c56dfcf5d079aad3df16
SHA3-384 hash: 03f9dc1bc1b9b5aee7e43524016129de67cb71a7b2ec291d16510d4e0203b8eef36df7229af2e9ae11e84a39e5fd217e
SHA1 hash: 1dd62f98dab3144439484063fed9a8943b31f8a5
MD5 hash: 6e3a64efd9e888d6c3ac77cc167989b9
humanhash: ack-nebraska-green-bacon
File name:brr
Download: download sample
Signature Mirai
File size:558 bytes
First seen:2025-02-04 02:11:45 UTC
Last seen:Never
File type: sh
MIME type:text/plain
ssdeep 12:NE8bq0QGkEd8kFe1EkKyEX6AEqX3HG4NIxEnXdg+EkXn:NE8jQGkEGkFe1EkSqAEqnHG4NIxEntzv
TLSH T11EF0629941923F9A486C9CB4F6F62065B011C6CAE7174ECBFC494438CC4F628FD34A88
Magika txt
Reporter abuse_ch
Tags:sh
URLMalware sample (SHA256 hash)SignatureTags
http://94.156.167.35/nabmips464b767532880910ad5a615225792238f340f8c020f31599b39bc1e3fc97209d Miraielf mirai ua-wget
http://94.156.167.35/nabmpsl7d6b75313802c35f95c5ce6d1357f1631f1987e844221b3a2233610687da5b3d Miraielf mirai ua-wget
http://94.156.167.35/nabarmffe4b4ff099a31da367a0360163f2bde0d1efbdd6743fc7bf17f327c75f9a723 Miraielf mirai ua-wget
http://94.156.167.35/nabarm535834118dd946a4d7599aff4f82ff1ce7be63e425e83aa451cc8ad4a3f141570 Miraielf mirai ua-wget
http://94.156.167.35/nabarm635834118dd946a4d7599aff4f82ff1ce7be63e425e83aa451cc8ad4a3f141570 Miraielf
http://94.156.167.35/nabarm743d0e79e74369d5118a66c252fa5fd8f06a2866505850807e9b8ed699b0f2aad Miraielf mirai ua-wget

Intelligence


File Origin
# of uploads :
1
# of downloads :
105
Origin country :
DE DE
Vendor Threat Intelligence
Verdict:
Malicious
Score:
97.4%
Tags:
mirai agent virus shell
Result
Verdict:
UNKNOWN
Threat name:
Linux.Trojan.Generic
Status:
Suspicious
First seen:
2025-02-04 03:17:31 UTC
File Type:
Text (Shell)
AV detection:
15 of 24 (62.50%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
discovery
Behaviour
Modifies registry class
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh d60841b76c5acbd5419e959c40183b223b212dc3f9f3c56dfcf5d079aad3df16

(this sample)

  
Delivery method
Distributed via web download

Comments