MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 d950b5354a32c76f5e35f3c1e8255b0a08db2f191656f2588c9436adf84506b4. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: d950b5354a32c76f5e35f3c1e8255b0a08db2f191656f2588c9436adf84506b4
SHA3-384 hash: 5c9722287ef4c27f467de933e5e3faf0861b8e1af5eda3a93de41381894c4cf30de459429962cdf258eae07ac5dd330d
SHA1 hash: ba0f0537ddfd910d21f616401577e67553733b3c
MD5 hash: 9cb9d27fc1ed1236ea8109cfd2880d39
humanhash: tango-sierra-avocado-mirror
File name:cn
Download: download sample
Signature Mirai
File size:546 bytes
First seen:2025-02-17 17:54:04 UTC
Last seen:Never
File type: sh
MIME type:text/plain
ssdeep 6:LwWgrzebTpwbYCDwWgrzLTKA1wyXICDwWgrze22MwZi/DwWgrzAwZJDwWgrzxNI8:fTK8IhAH3UNIbtv0YI
TLSH T1C4F04FCC5823BA82491CFD9F72B7169EB652C7DC904F8BDDAE85007D889DA44F058B94
Magika txt
Reporter abuse_ch
Tags:mirai sh
URLMalware sample (SHA256 hash)SignatureTags
http://193.143.1.32/mips6cb427e528d9d6e68e43e97ff0f81ddd5768458159561d0fafdb5dffd0b6f7b2 Mirai32-bit elf gafgyt mirai
http://193.143.1.32/mpsl86c056be36634614be66908d7f0972d73bb765bad533391385adf9656ac0151e Miraielf gafgyt mirai ua-wget
http://193.143.1.32/arm06cd477d71445530f3bb6ec717e553569719b20cdaac7243640a275f051af2d8 Mirai32-bit elf mirai
http://193.143.1.32/arm555bb1f8005d2fa8d651b660d4244c862511ad4a087fc11e9f431bd46133a9557 Miraielf mirai ua-wget
http://193.143.1.32/arm68e97f80775e8068982c685ca7f316fe380199675311ba3edc6c289acf32762ee Miraielf mirai ua-wget
http://193.143.1.32/arm717bf13198278d1613f8fc3d44d0c2b307dedcb6b8d1b269c00f5d361ffa43ee9 Miraielf mirai ua-wget

Intelligence


File Origin
# of uploads :
1
# of downloads :
52
Origin country :
DE DE
Vendor Threat Intelligence
Result
Verdict:
UNKNOWN
Threat name:
Linux.Trojan.Generic
Status:
Suspicious
First seen:
2025-02-17 18:37:11 UTC
File Type:
Text (Shell)
AV detection:
15 of 24 (62.50%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
discovery
Behaviour
Modifies registry class
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh d950b5354a32c76f5e35f3c1e8255b0a08db2f191656f2588c9436adf84506b4

(this sample)

  
Delivery method
Distributed via web download

Comments