MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 f2fdbad34df5ef7fe74c6079e0b090b5148ee88379a077d94670eb52880b4bb0. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: f2fdbad34df5ef7fe74c6079e0b090b5148ee88379a077d94670eb52880b4bb0
SHA3-384 hash: 0d25e8b5094971207528e4eff0cd899fc16412183086ebf710e0563fa4d04270f6805e4997cf5b609c8d12322b1cdac1
SHA1 hash: c48c2a41986856499de44750bc880dd9e0dbfc61
MD5 hash: fd2af417eb7eebd7c62ea64c7d971cc7
humanhash: foxtrot-sink-massachusetts-winter
File name:q
Download: download sample
Signature Mirai
File size:4'807 bytes
First seen:2025-12-13 07:49:55 UTC
Last seen:2025-12-13 21:28:15 UTC
File type: sh
MIME type:text/plain
ssdeep 96:1xe/eMe1jewe6ceGeHXXkZsqM3dRiPiwi17i8i6giKiHXfNK1xu66EHXNnxPRvBe:mmb1inAVHXXkZsqM3dRiPiwi17i8ipin
TLSH T1F2A1E3C9FDB173B34EE4DE1DF2A6862F708AA090A1215FA436CD70FD74EBD44AA01255
Magika shell
Reporter abuse_ch
Tags:mirai sh
URLMalware sample (SHA256 hash)SignatureTags
http://178.16.52.10/z/89/mipsb8efd9fc22ee259562c41a184ae8cf9d9228efbd58a20ccd2074476f63ea3c13 Mirai32-bit elf mirai Mozi
http://178.16.52.10/z/89/mpsln/an/an/a
http://178.16.52.10/z/89/x86_64n/an/an/a
http://178.16.52.10/z/89/arm4n/an/an/a
http://178.16.52.10/z/89/arm557c4be7164bd6838fd423f289cfa9ca76f77eae52db1cadac80b0ee2628f99c8 Miraiarm elf geofenced mirai ua-wget USA
http://178.16.52.10/z/89/arm6n/an/an/a
http://178.16.52.10/z/89/arm7n/an/an/a

Intelligence


File Origin
# of uploads :
2
# of downloads :
44
Origin country :
DE DE
Vendor Threat Intelligence
No detections
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
busybox medusa mirai
Verdict:
Malicious
File Type:
text
First seen:
2025-12-13T06:10:00Z UTC
Last seen:
2025-12-13T15:12:00Z UTC
Hits:
~10
Threat name:
Linux.Downloader.Medusa
Status:
Malicious
First seen:
2025-12-13 07:37:41 UTC
File Type:
Text (Shell)
AV detection:
18 of 38 (47.37%)
Threat level:
  3/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Modifies registry class
Suspicious use of SetWindowsHookEx
Enumerates physical storage devices
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh f2fdbad34df5ef7fe74c6079e0b090b5148ee88379a077d94670eb52880b4bb0

(this sample)

  
Delivery method
Distributed via web download

Comments