MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 e6666f6368dc181cc73393fbfff57c5582e3ef42929c9742a73bb93700b5bfe6. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: e6666f6368dc181cc73393fbfff57c5582e3ef42929c9742a73bb93700b5bfe6
SHA3-384 hash: c724a7d96bdb96c7887cadf250cbdc1e382b5db52bfa60897f8fd5c36bc429e3737da703c9dd171a369603323d2f08f0
SHA1 hash: b4d5c24b3221c04a11921bcab3d41e751f4a94dd
MD5 hash: 70c4a4c39d9eed962df02ae476754a0d
humanhash: eighteen-salami-blossom-zebra
File name:buf
Download: download sample
Signature Mirai
File size:669 bytes
First seen:2025-03-07 02:51:48 UTC
Last seen:Never
File type: sh
MIME type:text/plain
ssdeep 12:LfWUj2emgfWAkT+HzfWVJQ0fWRaLBHTyofW2NITt9DzfWbTW8:LWUj2yWAkCzWVJQgWRaLBHTyMW2NIp9a
TLSH T1B0014FA9006EFF43C0DCAF0A7A66F1BBB1304299001B1B88FDD514ACA88C952A275FD5
Magika txt
Reporter abuse_ch
Tags:sh
URLMalware sample (SHA256 hash)SignatureTags
http://176.65.134.5/splmips46894ab0365d99a0bb377497478ebabe75c295d6119ab5dce7c7c1ea90086efa Miraielf mirai
http://176.65.134.5/splmpslf135cf3046be829d6f1b7ef020c5dd9eca385aed561d782f8b4d03220a2a833d Miraielf mirai
http://176.65.134.5/splarm0c173caa930b8d384c6ae942987c9c0f51371f12f585a0e34d3b4e13d89f5b5b Miraielf mirai
http://176.65.134.5/splarm5c7bf13560d86a03a4b2d614105f2f45340652ebaad205c82194af27448b9b8ff Miraielf mirai
http://176.65.134.5/splarm6f2128b77af9e414b09f8427f9b1efee438971b7a99478031cb81eb99df1831e1 Miraielf mirai
http://176.65.134.5/splarm78312daded7f34a6803e7ed28ad921c93020cb2c865d669bb4a528e7a9c94ee01 Miraielf mirai

Intelligence


File Origin
# of uploads :
1
# of downloads :
119
Origin country :
DE DE
Vendor Threat Intelligence
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
bash lolbin
Result
Verdict:
UNKNOWN
Threat name:
Linux.Downloader.Generic
Status:
Suspicious
First seen:
2025-03-07 05:47:22 UTC
File Type:
Text (Shell)
AV detection:
10 of 24 (41.67%)
Threat level:
  3/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
discovery
Behaviour
Modifies registry class
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh e6666f6368dc181cc73393fbfff57c5582e3ef42929c9742a73bb93700b5bfe6

(this sample)

  
Delivery method
Distributed via web download

Comments