MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 f15c0ca896ecbe4719a2b1301dbb1cf8844110bec6652fd748df4a9ec4477ff0. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Mirai
Vendor detections: 7
| SHA256 hash: | f15c0ca896ecbe4719a2b1301dbb1cf8844110bec6652fd748df4a9ec4477ff0 |
|---|---|
| SHA3-384 hash: | 0c76bf324e49d2dc2ca95aab2ab2c0b89ffc6b3331c88ea07c4fee3c24fe072f1c04944ffd3071193dc72a23ac043f13 |
| SHA1 hash: | e150cbd868a3d02381884bb8622dc7e9135564ac |
| MD5 hash: | cc89abca9451b8b484a79bfc1ec36bd2 |
| humanhash: | mike-leopard-december-freddie |
| File name: | t |
| Download: | download sample |
| Signature | Mirai |
| File size: | 863 bytes |
| First seen: | 2025-02-17 17:54:11 UTC |
| Last seen: | 2025-03-20 16:00:30 UTC |
| File type: | sh |
| MIME type: | text/plain |
| ssdeep | 12:bgYIBgFXBgq0BgB6ABgeOBHBgQGBgR+WBg1DtBge0BgZlws:QaKOtYH+mE2sl |
| TLSH | T1341186CC043A7A814C1C692A71E7D1D7BA588744B07B1B8CAFCE02B8A1CD9217170FE0 |
| Magika | txt |
| Reporter | |
| Tags: | mirai sh |
Shell script dropper
This file seems to be a shell script dropper, using wget, ftpget and/or curl. More information about the corresponding payload URLs are shown below.
| URL | Malware sample (SHA256 hash) | Signature | Tags |
|---|---|---|---|
| http://185.172.128.16/splx86 | n/a | n/a | elf |
| http://185.172.128.16/splmips | n/a | n/a | elf |
| http://185.172.128.16/splmpsl | n/a | n/a | elf |
| http://185.172.128.16/splarm | n/a | n/a | elf |
| http://185.172.128.16/splarm5 | n/a | n/a | elf |
| http://185.172.128.16/splarm6 | n/a | n/a | elf |
| http://185.172.128.16/splarm7 | n/a | n/a | elf |
| http://185.172.128.16/splppc | n/a | n/a | elf |
| http://185.172.128.16/splm68k | n/a | n/a | elf |
| http://185.172.128.16/splsh4 | n/a | n/a | elf |
Intelligence
File Origin
# of uploads :
3
# of downloads :
51
Origin country :
DEVendor Threat Intelligence
Detection(s):
Verdict:
Malicious
Score:
93.3%
Link:
Tags:
mirai agent virus hype
Verdict:
Malicious
Threat level:
10/10
Confidence:
100%
Verdict:
Malicious
Labled as:
Downloader/Shell.Generic
Result
Verdict:
UNKNOWN
Score:
1%
Verdict:
Benign
File Type:
SCRIPT
Threat name:
Linux.Trojan.Generic
Status:
Suspicious
First seen:
2025-02-17 18:33:09 UTC
File Type:
Text (Shell)
AV detection:
12 of 24 (50.00%)
Threat level:
5/5
Detection(s):
Suspicious file
Result
Malware family:
n/a
Score:
3/10
Tags:
discovery
Behaviour
Modifies registry class
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Malicious File
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
e2455d23a0fd822a80054dba410540495298da3cb78219f40fdc49d6e47ce787
Delivery method
Distributed via web download
Dropping
MD5 c34e4fdf967e53cabdf0c73286fa05d3
Dropping
SHA256 e2455d23a0fd822a80054dba410540495298da3cb78219f40fdc49d6e47ce787
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.