MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 ef56344e1ce60aca2b9e9cffc09f1f79f8e54d0d6cd03119ba5f8cd34552a14f. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: ef56344e1ce60aca2b9e9cffc09f1f79f8e54d0d6cd03119ba5f8cd34552a14f
SHA3-384 hash: bf8ad6972b2769140cdcaeea84d72812720e260b6388c9016e1ad2d42599777bf63b02508a70792dc7d74404d3353bb0
SHA1 hash: 34fd655254c4595923ce1ff80e86737a8f18a008
MD5 hash: f950119a2fdb048434afae7c87ad1a52
humanhash: wolfram-violet-sixteen-fifteen
File name:gig.sh
Download: download sample
Signature Mirai
File size:208 bytes
First seen:2025-12-21 15:13:47 UTC
Last seen:Never
File type: sh
MIME type:text/plain
ssdeep 3:LgHKRwVZVb8NBzSa+ANja4qM4oq8Ui9WFKVgHKRwVZVCONBzSa5Ap99HM4oq8Ui9:LCfVbkPj5Zq7FgCfVxyvsZqC
TLSH T1B9D012DF10252A92E148AE512152B12E9E8586CA36610F9A9ACD1933BD8DA14FB88E31
Magika shell
Reporter abuse_ch
Tags:sh
URLMalware sample (SHA256 hash)SignatureTags
http://130.12.180.64/splmips2928a4694f399990791e7d0c00cb21c7fe852654df493d541097b7ce85815ec5 Miraielf mirai ua-wget
http://130.12.180.64/splmpsl3cd8a62933ca2ee92f4a556c9d59ae1679070eec6343b38d6ef6f75cf5190ced Miraielf mirai ua-wget

Intelligence


File Origin
# of uploads :
1
# of downloads :
38
Origin country :
DE DE
Vendor Threat Intelligence
No detections
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
busybox mirai
Verdict:
Malicious
File Type:
text
First seen:
2025-12-21T13:39:00Z UTC
Last seen:
2025-12-23T05:09:00Z UTC
Hits:
~10
Status:
terminated
Behavior Graph:
%3 guuid=fa10fca4-1d00-0000-bd22-5024fe0c0000 pid=3326 /usr/bin/sudo guuid=502561a8-1d00-0000-bd22-5024050d0000 pid=3333 /tmp/sample.bin guuid=fa10fca4-1d00-0000-bd22-5024fe0c0000 pid=3326->guuid=502561a8-1d00-0000-bd22-5024050d0000 pid=3333 execve guuid=4a0ebda8-1d00-0000-bd22-5024070d0000 pid=3335 /usr/bin/busybox net send-data write-file guuid=502561a8-1d00-0000-bd22-5024050d0000 pid=3333->guuid=4a0ebda8-1d00-0000-bd22-5024070d0000 pid=3335 execve guuid=98aca1ac-1d00-0000-bd22-5024100d0000 pid=3344 /usr/bin/chmod guuid=502561a8-1d00-0000-bd22-5024050d0000 pid=3333->guuid=98aca1ac-1d00-0000-bd22-5024100d0000 pid=3344 execve guuid=a339e9ac-1d00-0000-bd22-5024110d0000 pid=3345 /usr/bin/dash guuid=502561a8-1d00-0000-bd22-5024050d0000 pid=3333->guuid=a339e9ac-1d00-0000-bd22-5024110d0000 pid=3345 clone guuid=7c8c76ae-1d00-0000-bd22-5024170d0000 pid=3351 /usr/bin/rm guuid=502561a8-1d00-0000-bd22-5024050d0000 pid=3333->guuid=7c8c76ae-1d00-0000-bd22-5024170d0000 pid=3351 execve guuid=b01aafae-1d00-0000-bd22-5024190d0000 pid=3353 /usr/bin/busybox net send-data write-file guuid=502561a8-1d00-0000-bd22-5024050d0000 pid=3333->guuid=b01aafae-1d00-0000-bd22-5024190d0000 pid=3353 execve guuid=5c6458b2-1d00-0000-bd22-50241b0d0000 pid=3355 /usr/bin/chmod guuid=502561a8-1d00-0000-bd22-5024050d0000 pid=3333->guuid=5c6458b2-1d00-0000-bd22-50241b0d0000 pid=3355 execve guuid=92f5c9b2-1d00-0000-bd22-50241c0d0000 pid=3356 /usr/bin/dash guuid=502561a8-1d00-0000-bd22-5024050d0000 pid=3333->guuid=92f5c9b2-1d00-0000-bd22-50241c0d0000 pid=3356 clone guuid=a724d6b3-1d00-0000-bd22-50241e0d0000 pid=3358 /usr/bin/rm guuid=502561a8-1d00-0000-bd22-5024050d0000 pid=3333->guuid=a724d6b3-1d00-0000-bd22-50241e0d0000 pid=3358 execve f22fee75-ab34-540d-95fe-696883c6f4ad 130.12.180.64:80 guuid=4a0ebda8-1d00-0000-bd22-5024070d0000 pid=3335->f22fee75-ab34-540d-95fe-696883c6f4ad send: 83B guuid=b01aafae-1d00-0000-bd22-5024190d0000 pid=3353->f22fee75-ab34-540d-95fe-696883c6f4ad send: 83B
Threat name:
Win32.Trojan.Vigorf
Status:
Malicious
First seen:
2025-12-21 15:18:14 UTC
File Type:
Text (Shell)
AV detection:
7 of 24 (29.17%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Modifies registry class
Suspicious use of SetWindowsHookEx
Enumerates physical storage devices
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh ef56344e1ce60aca2b9e9cffc09f1f79f8e54d0d6cd03119ba5f8cd34552a14f

(this sample)

  
Delivery method
Distributed via web download

Comments