MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 f956fc9d97640ad663bf9d9f193702de858f32b1b03d235bfe5f374a3827d58f. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 6


Intelligence 6 IOCs YARA 1 File information Comments

SHA256 hash: f956fc9d97640ad663bf9d9f193702de858f32b1b03d235bfe5f374a3827d58f
SHA3-384 hash: 3ebc63b12c52d77ae78a6ea408107f84d2a1e482d3ba8696e56898eb7eadd989927db71fd8fdfcd771234c2a9463e264
SHA1 hash: ebaaeff8fde922947ef404f8c694ae21113c608a
MD5 hash: 25283562baf572ec8c48a32cdcbe4cdb
humanhash: triple-connecticut-london-network
File name:olor
Download: download sample
Signature Mirai
File size:242 bytes
First seen:2025-12-05 18:21:31 UTC
Last seen:Never
File type: sh
MIME type:text/plain
ssdeep 6:L6Frx8ZXt5/jNwAK7PSrx8Vzg6FrLJZXt5/ZWJNwAbJ78J0bZrLJn:vth2A9m5XthoTwA2aZh
TLSH T1FBD05E9BD004A6B4D20AE88E317003DE72238B9F70A74F51AD48307FA2C44D8B011A08
Magika batch
Reporter abuse_ch
Tags:sh
URLMalware sample (SHA256 hash)SignatureTags
http://213.209.143.64/zermips3f622b288e8182003119ed88145a8c767b94813a364eae2c6e12344c8787ca3e Miraielf mirai ua-wget
http://213.209.143.64/zermpsld601648e9899e851aeed28f8647b34e99568d2db7ec355b1bb006a13ef3193a8 Miraielf mirai ua-wget

Intelligence


File Origin
# of uploads :
1
# of downloads :
15
Origin country :
DE DE
Vendor Threat Intelligence
No detections
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
evasive mirai
Verdict:
Malicious
File Type:
text
First seen:
2025-12-05T16:20:00Z UTC
Last seen:
2025-12-07T12:20:00Z UTC
Hits:
~10
Threat name:
Script-Shell.Browser.Tsunami
Status:
Malicious
First seen:
2025-12-05 18:26:20 UTC
File Type:
Text (Shell)
AV detection:
8 of 38 (21.05%)
Threat level:
  4/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Modifies registry class
Suspicious use of SetWindowsHookEx
Enumerates physical storage devices
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:ach_202412_suspect_bash_script
Author:abuse.ch
Description:Detects suspicious Linux bash scripts

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh f956fc9d97640ad663bf9d9f193702de858f32b1b03d235bfe5f374a3827d58f

(this sample)

  
Delivery method
Distributed via web download

Comments