MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 fd10992c807133713f87397e461d9ded132a188a6eceb0feae9dbbf4ba72a285. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: fd10992c807133713f87397e461d9ded132a188a6eceb0feae9dbbf4ba72a285
SHA3-384 hash: 79fd5e4331bcbab3c74698588285e90f7aeba0e716824d42159467ca6072bf494552327610d48b590f48a52540dcdf5c
SHA1 hash: 029c8c525a6112f4aa62f4bfadc4e03f3b2d6c61
MD5 hash: b56760c34d912b141fb1eee51897934d
humanhash: venus-steak-finch-moon
File name:c.sh
Download: download sample
Signature Mirai
File size:721 bytes
First seen:2025-12-19 10:07:23 UTC
Last seen:Never
File type: sh
MIME type:text/plain
ssdeep 12:3J3jv74cfj0rjqNIlrNpjXG7KQjJhj0tjKECjNGR2jcZLCkjL/jD22S5Vn:3J3PvYaNIlZ87KeEtTZLCgEn
TLSH T1ED010CCE4A652F163A02BD4DB251D03E9100E0D0366B991BFF6C256F95FC5923F252AB
Magika shell
Reporter abuse_ch
Tags:sh
URLMalware sample (SHA256 hash)SignatureTags
http://45.132.180.127/xparm4n/an/aelf ua-wget
http://45.132.180.127/xparm5249bc7c5f69ca45551a7b7c35076a8a63b9c6de3d5228ca3006bd92583351fcf Miraielf mirai ua-wget
http://45.132.180.127/xparm607ae848cc5ba570446b2e3e1ec560c6bb7f05e810a84a77a71f19c3f43270d65 Miraielf mirai ua-wget
http://45.132.180.127/xparm79c2c71084ec60f3df3fb5593d171e415af377298eff7f4bc4475be22cddbab25 Miraielf mirai ua-wget
http://45.132.180.127/xpm68k354c87c3d98f170852b5857bba1cb6a92adba034222b9558b3869f3f0149bc26 Miraielf mirai ua-wget
http://45.132.180.127/xpsh4b1fc3796b8cb3d426fc74e6d9f06637ab1643f071283dd63ac8a1ce5a26f0834 Miraielf mirai ua-wget
http://45.132.180.127/xpmips2b63ef456fbcfaa61cac464fd974a01fc3e8c77f378ae83bcaa52b66e5f3db0c Miraielf mirai ua-wget
http://45.132.180.127/xpmpsl7ef1315c3e6667d670dfc11e07302c845b41f1e4643a0ca4c42e0d5390ad5080 Miraielf mirai ua-wget
http://45.132.180.127/xpppc6e675c36a690663707594e209383561ca3dd8e732e623bd9339f3819561cb00a Miraielf mirai ua-wget
http://45.132.180.127/xpx86a76639e5ec05e6394636795bb2873c0127b0aa340d9f0f0067377263008d9dad Miraielf mirai ua-wget
http://45.132.180.127/xpspcb8d3fa58b5c2de4ae7ac3ab396ce12f3db1fdcd1471115dcfaed4acb996f1d39 Miraielf mirai ua-wget

Intelligence


File Origin
# of uploads :
1
# of downloads :
38
Origin country :
DE DE
Vendor Threat Intelligence
No detections
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
mirai
Verdict:
Malicious
File Type:
text
First seen:
2025-12-19T08:29:00Z UTC
Last seen:
2025-12-20T03:34:00Z UTC
Hits:
~10
Status:
terminated
Behavior Graph:
%3 guuid=a4f263ea-1900-0000-89df-1c02d40d0000 pid=3540 /usr/bin/sudo guuid=b43294ec-1900-0000-89df-1c02db0d0000 pid=3547 /tmp/sample.bin guuid=a4f263ea-1900-0000-89df-1c02d40d0000 pid=3540->guuid=b43294ec-1900-0000-89df-1c02db0d0000 pid=3547 execve guuid=d15fd2ec-1900-0000-89df-1c02dc0d0000 pid=3548 /usr/bin/curl net send-data guuid=b43294ec-1900-0000-89df-1c02db0d0000 pid=3547->guuid=d15fd2ec-1900-0000-89df-1c02dc0d0000 pid=3548 execve guuid=48a234f6-1900-0000-89df-1c02f70d0000 pid=3575 /usr/bin/chmod guuid=b43294ec-1900-0000-89df-1c02db0d0000 pid=3547->guuid=48a234f6-1900-0000-89df-1c02f70d0000 pid=3575 execve guuid=8d13d4f6-1900-0000-89df-1c02fa0d0000 pid=3578 /usr/bin/dash guuid=b43294ec-1900-0000-89df-1c02db0d0000 pid=3547->guuid=8d13d4f6-1900-0000-89df-1c02fa0d0000 pid=3578 clone guuid=9dc0eaf6-1900-0000-89df-1c02fb0d0000 pid=3579 /usr/bin/curl net send-data guuid=b43294ec-1900-0000-89df-1c02db0d0000 pid=3547->guuid=9dc0eaf6-1900-0000-89df-1c02fb0d0000 pid=3579 execve guuid=7d4f30fe-1900-0000-89df-1c020e0e0000 pid=3598 /usr/bin/chmod guuid=b43294ec-1900-0000-89df-1c02db0d0000 pid=3547->guuid=7d4f30fe-1900-0000-89df-1c020e0e0000 pid=3598 execve guuid=3e326dfe-1900-0000-89df-1c02100e0000 pid=3600 /usr/bin/dash guuid=b43294ec-1900-0000-89df-1c02db0d0000 pid=3547->guuid=3e326dfe-1900-0000-89df-1c02100e0000 pid=3600 clone guuid=193f7bfe-1900-0000-89df-1c02110e0000 pid=3601 /usr/bin/curl net send-data guuid=b43294ec-1900-0000-89df-1c02db0d0000 pid=3547->guuid=193f7bfe-1900-0000-89df-1c02110e0000 pid=3601 execve guuid=fc689c02-1a00-0000-89df-1c021c0e0000 pid=3612 /usr/bin/chmod guuid=b43294ec-1900-0000-89df-1c02db0d0000 pid=3547->guuid=fc689c02-1a00-0000-89df-1c021c0e0000 pid=3612 execve guuid=2730f202-1a00-0000-89df-1c021f0e0000 pid=3615 /usr/bin/dash guuid=b43294ec-1900-0000-89df-1c02db0d0000 pid=3547->guuid=2730f202-1a00-0000-89df-1c021f0e0000 pid=3615 clone guuid=5c5cf702-1a00-0000-89df-1c02200e0000 pid=3616 /usr/bin/curl net send-data guuid=b43294ec-1900-0000-89df-1c02db0d0000 pid=3547->guuid=5c5cf702-1a00-0000-89df-1c02200e0000 pid=3616 execve guuid=fe50340b-1a00-0000-89df-1c023f0e0000 pid=3647 /usr/bin/chmod guuid=b43294ec-1900-0000-89df-1c02db0d0000 pid=3547->guuid=fe50340b-1a00-0000-89df-1c023f0e0000 pid=3647 execve guuid=beec7a0b-1a00-0000-89df-1c02410e0000 pid=3649 /usr/bin/dash guuid=b43294ec-1900-0000-89df-1c02db0d0000 pid=3547->guuid=beec7a0b-1a00-0000-89df-1c02410e0000 pid=3649 clone guuid=cd6c860b-1a00-0000-89df-1c02420e0000 pid=3650 /usr/bin/curl net send-data guuid=b43294ec-1900-0000-89df-1c02db0d0000 pid=3547->guuid=cd6c860b-1a00-0000-89df-1c02420e0000 pid=3650 execve guuid=0be05b12-1a00-0000-89df-1c02510e0000 pid=3665 /usr/bin/chmod guuid=b43294ec-1900-0000-89df-1c02db0d0000 pid=3547->guuid=0be05b12-1a00-0000-89df-1c02510e0000 pid=3665 execve guuid=c92fa312-1a00-0000-89df-1c02530e0000 pid=3667 /usr/bin/dash guuid=b43294ec-1900-0000-89df-1c02db0d0000 pid=3547->guuid=c92fa312-1a00-0000-89df-1c02530e0000 pid=3667 clone guuid=aa7faa12-1a00-0000-89df-1c02540e0000 pid=3668 /usr/bin/curl net send-data guuid=b43294ec-1900-0000-89df-1c02db0d0000 pid=3547->guuid=aa7faa12-1a00-0000-89df-1c02540e0000 pid=3668 execve guuid=dd853818-1a00-0000-89df-1c02590e0000 pid=3673 /usr/bin/chmod guuid=b43294ec-1900-0000-89df-1c02db0d0000 pid=3547->guuid=dd853818-1a00-0000-89df-1c02590e0000 pid=3673 execve guuid=b92baa18-1a00-0000-89df-1c025a0e0000 pid=3674 /usr/bin/dash guuid=b43294ec-1900-0000-89df-1c02db0d0000 pid=3547->guuid=b92baa18-1a00-0000-89df-1c025a0e0000 pid=3674 clone guuid=9a0fcf18-1a00-0000-89df-1c025b0e0000 pid=3675 /usr/bin/curl net send-data guuid=b43294ec-1900-0000-89df-1c02db0d0000 pid=3547->guuid=9a0fcf18-1a00-0000-89df-1c025b0e0000 pid=3675 execve guuid=5f5b9721-1a00-0000-89df-1c02680e0000 pid=3688 /usr/bin/chmod guuid=b43294ec-1900-0000-89df-1c02db0d0000 pid=3547->guuid=5f5b9721-1a00-0000-89df-1c02680e0000 pid=3688 execve guuid=9f90bc22-1a00-0000-89df-1c02690e0000 pid=3689 /usr/bin/dash guuid=b43294ec-1900-0000-89df-1c02db0d0000 pid=3547->guuid=9f90bc22-1a00-0000-89df-1c02690e0000 pid=3689 clone guuid=e5e7d422-1a00-0000-89df-1c026a0e0000 pid=3690 /usr/bin/curl net send-data guuid=b43294ec-1900-0000-89df-1c02db0d0000 pid=3547->guuid=e5e7d422-1a00-0000-89df-1c026a0e0000 pid=3690 execve guuid=3a310b2a-1a00-0000-89df-1c02780e0000 pid=3704 /usr/bin/chmod guuid=b43294ec-1900-0000-89df-1c02db0d0000 pid=3547->guuid=3a310b2a-1a00-0000-89df-1c02780e0000 pid=3704 execve guuid=a7b9562a-1a00-0000-89df-1c027a0e0000 pid=3706 /usr/bin/dash guuid=b43294ec-1900-0000-89df-1c02db0d0000 pid=3547->guuid=a7b9562a-1a00-0000-89df-1c027a0e0000 pid=3706 clone guuid=d9ba662a-1a00-0000-89df-1c027b0e0000 pid=3707 /usr/bin/curl net send-data guuid=b43294ec-1900-0000-89df-1c02db0d0000 pid=3547->guuid=d9ba662a-1a00-0000-89df-1c027b0e0000 pid=3707 execve guuid=a1e29a30-1a00-0000-89df-1c028e0e0000 pid=3726 /usr/bin/chmod guuid=b43294ec-1900-0000-89df-1c02db0d0000 pid=3547->guuid=a1e29a30-1a00-0000-89df-1c028e0e0000 pid=3726 execve guuid=5c34ef30-1a00-0000-89df-1c02920e0000 pid=3730 /usr/bin/dash guuid=b43294ec-1900-0000-89df-1c02db0d0000 pid=3547->guuid=5c34ef30-1a00-0000-89df-1c02920e0000 pid=3730 clone guuid=d24cf530-1a00-0000-89df-1c02930e0000 pid=3731 /usr/bin/curl net send-data guuid=b43294ec-1900-0000-89df-1c02db0d0000 pid=3547->guuid=d24cf530-1a00-0000-89df-1c02930e0000 pid=3731 execve guuid=62e3cf38-1a00-0000-89df-1c02b10e0000 pid=3761 /usr/bin/chmod guuid=b43294ec-1900-0000-89df-1c02db0d0000 pid=3547->guuid=62e3cf38-1a00-0000-89df-1c02b10e0000 pid=3761 execve guuid=19b61839-1a00-0000-89df-1c02b20e0000 pid=3762 /usr/bin/dash guuid=b43294ec-1900-0000-89df-1c02db0d0000 pid=3547->guuid=19b61839-1a00-0000-89df-1c02b20e0000 pid=3762 clone guuid=83d71f39-1a00-0000-89df-1c02b30e0000 pid=3763 /usr/bin/curl net send-data guuid=b43294ec-1900-0000-89df-1c02db0d0000 pid=3547->guuid=83d71f39-1a00-0000-89df-1c02b30e0000 pid=3763 execve guuid=87895b41-1a00-0000-89df-1c02c70e0000 pid=3783 /usr/bin/chmod guuid=b43294ec-1900-0000-89df-1c02db0d0000 pid=3547->guuid=87895b41-1a00-0000-89df-1c02c70e0000 pid=3783 execve guuid=ac98ad41-1a00-0000-89df-1c02c80e0000 pid=3784 /usr/bin/dash guuid=b43294ec-1900-0000-89df-1c02db0d0000 pid=3547->guuid=ac98ad41-1a00-0000-89df-1c02c80e0000 pid=3784 clone guuid=b7dcb941-1a00-0000-89df-1c02c90e0000 pid=3785 /usr/bin/rm delete-file guuid=b43294ec-1900-0000-89df-1c02db0d0000 pid=3547->guuid=b7dcb941-1a00-0000-89df-1c02c90e0000 pid=3785 execve b6e962c7-e2ba-5bb0-8ff4-7d18fe528266 45.132.180.127:80 guuid=d15fd2ec-1900-0000-89df-1c02dc0d0000 pid=3548->b6e962c7-e2ba-5bb0-8ff4-7d18fe528266 send: 84B guuid=9dc0eaf6-1900-0000-89df-1c02fb0d0000 pid=3579->b6e962c7-e2ba-5bb0-8ff4-7d18fe528266 send: 84B guuid=193f7bfe-1900-0000-89df-1c02110e0000 pid=3601->b6e962c7-e2ba-5bb0-8ff4-7d18fe528266 send: 84B guuid=5c5cf702-1a00-0000-89df-1c02200e0000 pid=3616->b6e962c7-e2ba-5bb0-8ff4-7d18fe528266 send: 84B guuid=cd6c860b-1a00-0000-89df-1c02420e0000 pid=3650->b6e962c7-e2ba-5bb0-8ff4-7d18fe528266 send: 84B guuid=aa7faa12-1a00-0000-89df-1c02540e0000 pid=3668->b6e962c7-e2ba-5bb0-8ff4-7d18fe528266 send: 83B guuid=9a0fcf18-1a00-0000-89df-1c025b0e0000 pid=3675->b6e962c7-e2ba-5bb0-8ff4-7d18fe528266 send: 84B guuid=e5e7d422-1a00-0000-89df-1c026a0e0000 pid=3690->b6e962c7-e2ba-5bb0-8ff4-7d18fe528266 send: 84B guuid=d9ba662a-1a00-0000-89df-1c027b0e0000 pid=3707->b6e962c7-e2ba-5bb0-8ff4-7d18fe528266 send: 83B guuid=d24cf530-1a00-0000-89df-1c02930e0000 pid=3731->b6e962c7-e2ba-5bb0-8ff4-7d18fe528266 send: 83B guuid=83d71f39-1a00-0000-89df-1c02b30e0000 pid=3763->b6e962c7-e2ba-5bb0-8ff4-7d18fe528266 send: 83B
Threat name:
Win32.Trojan.Vigorf
Status:
Malicious
First seen:
2025-12-19 10:08:26 UTC
File Type:
Text (Shell)
AV detection:
7 of 24 (29.17%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Modifies registry class
Suspicious use of SetWindowsHookEx
Enumerates physical storage devices
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh fd10992c807133713f87397e461d9ded132a188a6eceb0feae9dbbf4ba72a285

(this sample)

  
Delivery method
Distributed via web download

Comments