MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 f3791d002adb41bbdce66cacb7ed04487c5afe316260d1a6875c56ba98bbfc7c. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: f3791d002adb41bbdce66cacb7ed04487c5afe316260d1a6875c56ba98bbfc7c
SHA3-384 hash: 13663bca37d8e100160785cb16a4f71f1ee2ef4374f94fd2edbaba6732e8ea434052e6763a90fe0ab6dd0d683a9e4a54
SHA1 hash: 33be29915f459fb1a208cefc516d7b0062e7a2ca
MD5 hash: ead2829efbb33e4d5c1a4b96eb06fed2
humanhash: nineteen-vermont-nineteen-mountain
File name:vowan.sh
Download: download sample
Signature Mirai
File size:138 bytes
First seen:2025-12-21 15:14:38 UTC
Last seen:Never
File type: sh
MIME type:text/plain
ssdeep 3:GRFdVZvx8DBFSTAKUKjWVx0FdVZvoWJZ3FSTAbJTobJziLc:SdCeAKTjWcFdAWJeAbJTobJr
TLSH T18DC08C8F4000F5A8600E39E831F0038BA2C28B0E38300E0ACC8020F388C0248770CA39
Magika txt
Reporter abuse_ch
Tags:sh
URLMalware sample (SHA256 hash)SignatureTags
http://130.12.180.64/zermips9be98b3850d8e4cd3ac499489853fd2c8db518d51192c9989a9cc807fdceb6b0 Miraielf mirai ua-wget
http://130.12.180.64/zermpsl1ec1af3038d6d292a0d762128b10c8899c52daf4cd2cec8d804eab1c653f8a3d Miraielf mirai ua-wget

Intelligence


File Origin
# of uploads :
1
# of downloads :
38
Origin country :
DE DE
Vendor Threat Intelligence
No detections
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
mirai
Verdict:
Malicious
File Type:
text
First seen:
2025-12-21T13:51:00Z UTC
Last seen:
2025-12-21T15:02:00Z UTC
Hits:
~10
Status:
terminated
Behavior Graph:
%3 guuid=a99871d8-1b00-0000-8381-f6d302090000 pid=2306 /usr/bin/sudo guuid=7a98c7da-1b00-0000-8381-f6d307090000 pid=2311 /tmp/sample.bin guuid=a99871d8-1b00-0000-8381-f6d302090000 pid=2306->guuid=7a98c7da-1b00-0000-8381-f6d307090000 pid=2311 execve guuid=ca7209db-1b00-0000-8381-f6d309090000 pid=2313 /usr/bin/wget net send-data write-file guuid=7a98c7da-1b00-0000-8381-f6d307090000 pid=2311->guuid=ca7209db-1b00-0000-8381-f6d309090000 pid=2313 execve guuid=471a29e0-1b00-0000-8381-f6d30f090000 pid=2319 /usr/bin/chmod guuid=7a98c7da-1b00-0000-8381-f6d307090000 pid=2311->guuid=471a29e0-1b00-0000-8381-f6d30f090000 pid=2319 execve guuid=55b278e0-1b00-0000-8381-f6d311090000 pid=2321 /usr/bin/dash guuid=7a98c7da-1b00-0000-8381-f6d307090000 pid=2311->guuid=55b278e0-1b00-0000-8381-f6d311090000 pid=2321 clone guuid=cf2a14e1-1b00-0000-8381-f6d315090000 pid=2325 /usr/bin/wget net send-data write-file guuid=7a98c7da-1b00-0000-8381-f6d307090000 pid=2311->guuid=cf2a14e1-1b00-0000-8381-f6d315090000 pid=2325 execve guuid=2edbbce4-1b00-0000-8381-f6d322090000 pid=2338 /usr/bin/chmod guuid=7a98c7da-1b00-0000-8381-f6d307090000 pid=2311->guuid=2edbbce4-1b00-0000-8381-f6d322090000 pid=2338 execve guuid=d261fee4-1b00-0000-8381-f6d323090000 pid=2339 /usr/bin/dash guuid=7a98c7da-1b00-0000-8381-f6d307090000 pid=2311->guuid=d261fee4-1b00-0000-8381-f6d323090000 pid=2339 clone f22fee75-ab34-540d-95fe-696883c6f4ad 130.12.180.64:80 guuid=ca7209db-1b00-0000-8381-f6d309090000 pid=2313->f22fee75-ab34-540d-95fe-696883c6f4ad send: 135B guuid=cf2a14e1-1b00-0000-8381-f6d315090000 pid=2325->f22fee75-ab34-540d-95fe-696883c6f4ad send: 135B
Threat name:
Text.Browser.Generic
Status:
Suspicious
First seen:
2025-12-21 15:18:20 UTC
File Type:
Text (Shell)
AV detection:
2 of 24 (8.33%)
Threat level:
  4/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Modifies registry class
Suspicious use of SetWindowsHookEx
Enumerates physical storage devices
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh f3791d002adb41bbdce66cacb7ed04487c5afe316260d1a6875c56ba98bbfc7c

(this sample)

  
Delivery method
Distributed via web download

Comments