MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 0235a4e1c119c8419f8acb6e541aacfa0ca33892412b997cc8c71258cae15a61. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 8


Intelligence 8 IOCs YARA 1 File information Comments

SHA256 hash: 0235a4e1c119c8419f8acb6e541aacfa0ca33892412b997cc8c71258cae15a61
SHA3-384 hash: fee51186748a27162fa79745c8ce5b9eb3719ae4d99a0b14ffb0d80bc66012417170b7cb7c899808aaeb8fac9b66f90e
SHA1 hash: e6e473d251576db53adacc8ee56374b44edf0d08
MD5 hash: d4591b4e1c9a80da841ccc3fecebfeaa
humanhash: cat-oscar-mike-golf
File name:cat.sh
Download: download sample
Signature Mirai
File size:1'929 bytes
First seen:2026-01-05 13:39:41 UTC
Last seen:Never
File type: sh
MIME type:text/x-shellscript
ssdeep 48:8838h8P858U8iS8l8T1n8U89b8C8Mi8H8R8n8h868V8x8po7s8m8cS8v8V8E858l:8mKgaRjSo01n58bF+Eyg6lGk2P32Oulr
TLSH T1AE41E1DE71B4224A87C8CE5071E64FD86325D991E3F90632DE812E6A4C8ED94303DA35
TrID 70.0% (.SH) Linux/UNIX shell script (7000/1)
30.0% (.) Unix-like shebang (var.3) (gen) (3000/1)
Magika shell
Reporter abuse_ch
Tags:sh
URLMalware sample (SHA256 hash)SignatureTags
http://201.149.127.158/iran.x86_64n/an/airanbot mirai p2p
http://201.149.127.158/iran.aarch642fed5aa0f4dabbc17cfbc108357b28589417113a1fd502d7b7eb9377877ff072 Miraielf mirai ua-wget
http://201.149.127.158/iran.m68ka894f40611a7776684d3330ffea9e34def2e710e8cd15d9c1a7367474a016928 Miraielf mirai ua-wget
http://201.149.127.158/iran.mips981907e3f5ed07062b33b3e992d1f3412a2f3352208e92c1b58ff3c2387d50ae Miraiiranbot mirai p2p
http://201.149.127.158/iran.mipsel49472a57ff0b045cf8f489b6f29ef6cde639fd62b51c04680f040745d151fe09 Miraielf mirai ua-wget
http://201.149.127.158/iran.powerpc3fd502d73688faac146ab9bba5ff791e4dbaafc220f3c7492737859ad8516077 Miraielf mirai ua-wget
http://201.149.127.158/iran.sparc5b31a83837d4d4b169810aa674bd2686fe0b7916c75db1b5122d3b0db7994a02 Miraielf mirai ua-wget
http://201.149.127.158/iran.sh4cf59336456dbb6e973839c27b33252a908638454b033344a718d6881667e849e Miraielf mirai ua-wget
http://201.149.127.158/iran.arcdf3de85c31b85000b441cedc63ffde170d54827a34fe814811bce9a9a3297d8c Miraielf mirai ua-wget
http://201.149.127.158/iran.i486312cde2c1c427f14bfad7cd87afe884baf63eec8914a287e48482e7f0b4fd666 Miraielf mirai ua-wget
http://201.149.127.158/iran.armv4l3c69b6333be690815138432887a3e23760779bccd3d75b987c4c01fe87d1085c Miraielf mirai ua-wget
http://201.149.127.158/iran.armv5ld95b6b771354b7926d87c911b379b40663e781d7558166c40b934276bb84683d Miraielf mirai ua-wget
http://201.149.127.158/iran.armv6l6fbe7a65da1bff2577dee54055d309981090a836fb11b2fcadac3e64a024b0be Miraielf mirai ua-wget
http://201.149.127.158/iran.armv7l28f30473bd428385155296eacf8deae47790935ffd159d8ec51229eae644cc8e Miraielf mirai ua-wget

Intelligence


File Origin
# of uploads :
1
# of downloads :
60
Origin country :
DE DE
Vendor Threat Intelligence
No detections
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
bash lolbin mirai
Verdict:
Malicious
File Type:
unix shell
First seen:
2026-01-05T10:45:00Z UTC
Last seen:
2026-01-06T00:55:00Z UTC
Hits:
~10
Detections:
HEUR:Trojan-Downloader.Shell.Agent.a
Threat name:
Document-HTML.Trojan.Vigorf
Status:
Malicious
First seen:
2026-01-05 13:40:29 UTC
File Type:
Text (Shell)
AV detection:
13 of 24 (54.17%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
antivm defense_evasion discovery linux
Behaviour
Reads runtime system information
System Network Configuration Discovery
Writes file to tmp directory
Changes its process name
Checks CPU configuration
Enumerates running processes
File and Directory Permissions Modification
Deletes itself
Executes dropped EXE
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:MAL_Linux_IoT_MultiArch_BotnetLoader_Generic
Author:Anish Bogati
Description:Technique-based detection of IoT/Linux botnet loader shell scripts downloading binaries from numeric IPs, chmodding, and executing multi-architecture payloads
Reference:MalwareBazaar sample lilin.sh

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh 0235a4e1c119c8419f8acb6e541aacfa0ca33892412b997cc8c71258cae15a61

(this sample)

  
Delivery method
Distributed via web download

Comments