MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 fcbc29a95528e635267b568024089c8598123927139dfe15dcf9b1491b107758. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: fcbc29a95528e635267b568024089c8598123927139dfe15dcf9b1491b107758
SHA3-384 hash: d5491a4cccbd267b4303232819f83f25ae48d7817cde91fe2468dba882bdd10487d945483061b7b4f628fa9601e532be
SHA1 hash: 907f9b08c1128024d2ad99ceedb7aed5e59dbb0d
MD5 hash: 6d07dcef45d60df212a7e587721f253d
humanhash: jupiter-sad-washington-wolfram
File name:t.sh
Download: download sample
Signature Mirai
File size:4'905 bytes
First seen:2025-12-10 08:15:01 UTC
Last seen:Never
File type: sh
MIME type:text/plain
ssdeep 96:1xMf8bHtc5gXzwIsTAjL5g9MXwHz/XNUfDfx:xDXzwIsTAjLu9MXwHLXNUfDfx
TLSH T1DAA1F8C93A513333CD95DD7EE666495B2082E0C042354FE4B68830FC76ABDC4F690EA9
Magika txt
Reporter abuse_ch
Tags:mirai sh
URLMalware sample (SHA256 hash)SignatureTags
http://92.112.125.172/z/89/mips67d14607625e9959f595650cae0dab34d9dbaed8baca79270c9aee9a5f8dab6f Miraielf mirai ua-wget
http://92.112.125.172/z/89/mpsld737b65bddabf106eb6642a551b2b4c848101ae57e00de37c9d9a2670a52f9d9 Miraielf mirai ua-wget
http://92.112.125.172/z/89/x86_6413d151f0910a9ec48ea9a1854ec4ed04c50b920673a2d963bcc7fa233d217126 Miraielf mirai ua-wget
http://92.112.125.172/z/89/arm4n/an/aelf ua-wget
http://92.112.125.172/z/89/arm571ecf29f0548ecb0051046067bf46b3966c596a554bde739db08900b38198918 Miraielf mirai ua-wget
http://92.112.125.172/z/89/arm65e40a628404e0381d24f344df4e0250f01e94137aa3f98602b631c71a5c329c1 Miraielf mirai ua-wget
http://92.112.125.172/z/89/arm72f220f990fa4b3dd2db426c36428a4a66a0a55fbbb98dc3b5f1fbc240f692002 Miraielf mirai ua-wget

Intelligence


File Origin
# of uploads :
1
# of downloads :
47
Origin country :
DE DE
Vendor Threat Intelligence
No detections
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
busybox medusa mirai
Verdict:
Malicious
File Type:
text
First seen:
2025-12-10T06:38:00Z UTC
Last seen:
2025-12-10T09:42:00Z UTC
Hits:
~10
Threat name:
Linux.Downloader.Medusa
Status:
Malicious
First seen:
2025-12-10 07:17:48 UTC
File Type:
Text (Shell)
AV detection:
12 of 24 (50.00%)
Threat level:
  3/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Modifies registry class
Suspicious use of SetWindowsHookEx
Enumerates physical storage devices
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh fcbc29a95528e635267b568024089c8598123927139dfe15dcf9b1491b107758

(this sample)

  
Delivery method
Distributed via web download

Comments