MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 0706cc3e9ebedc0accea81ceca78c6cd10b908425312169d68c24db43e1a3ce3. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 6


Intelligence 6 IOCs YARA 1 File information Comments

SHA256 hash: 0706cc3e9ebedc0accea81ceca78c6cd10b908425312169d68c24db43e1a3ce3
SHA3-384 hash: dc041632fc13dbe13f1040032676798084ff02b5cdfcc788bea8660082f70b22cf50f13c8118aaac92294e1a8f4da978
SHA1 hash: b635d9ecc89186253fb452d3e15b1399b1b5da04
MD5 hash: 592123088fa210ef56f6872a04613dda
humanhash: angel-spaghetti-cold-oscar
File name:g
Download: download sample
Signature Mirai
File size:504 bytes
First seen:2025-10-26 15:45:51 UTC
Last seen:2025-10-26 21:59:00 UTC
File type: sh
MIME type:text/plain
ssdeep 6:tfLwVIjZEazGgyx0FZE1o+jZE8NNIYesaZEUabLK+ovSZE9NZdxhXZEGJN1G:tzwcLYlVNIYJUGvK+okmXhpDw
TLSH T1F0F0129B8C52270B08D8FD8571638818503AE2CF7CF69BCFFDDC64A9D1985147126F8A
Magika batch
Reporter abuse_ch
Tags:sh
URLMalware sample (SHA256 hash)SignatureTags
http://23.177.185.39/karmn/an/aelf ua-wget
http://23.177.185.39/karm5843157ebe28a28f5b8d7c695d81e9865e3bcec3b47c93a723d3b1eb8bc69dcb2 Miraielf mirai
http://23.177.185.39/karm6afd441aff2f9f1e23fa2019320423c8b9e7853679906f27df5da4c5120f68979 Miraiarm elf geofenced mirai opendir ua-wget USA
http://23.177.185.39/karm7100d9230a830fe2851c5392c843ecf2d58bfe7de38653b252a4a43581266a172 Miraielf mirai
http://23.177.185.39/kmips3203cde4bf0411aa8962b76dc7d71616d0e5c2511cb6d30d116d3b6e5106d677 Miraielf gafgyt mirai
http://23.177.185.39/kmpsla1c06d051259c38bb04a443331df120fedaa031f909ae8a6586e41a55fa0ccf9 Miraielf mirai

Intelligence


File Origin
# of uploads :
2
# of downloads :
53
Origin country :
DE DE
Vendor Threat Intelligence
Verdict:
Malicious
File Type:
text
First seen:
2025-10-26T13:42:00Z UTC
Last seen:
2025-10-26T13:47:00Z UTC
Hits:
~10
Status:
terminated
Behavior Graph:
%3 guuid=039f25a9-1600-0000-8a33-8109e70d0000 pid=3559 /usr/bin/sudo guuid=346ffcaa-1600-0000-8a33-8109ed0d0000 pid=3565 /tmp/sample.bin guuid=039f25a9-1600-0000-8a33-8109e70d0000 pid=3559->guuid=346ffcaa-1600-0000-8a33-8109ed0d0000 pid=3565 execve guuid=403988ab-1600-0000-8a33-8109ef0d0000 pid=3567 /usr/bin/mkdir guuid=346ffcaa-1600-0000-8a33-8109ed0d0000 pid=3565->guuid=403988ab-1600-0000-8a33-8109ef0d0000 pid=3567 execve guuid=a0b527ac-1600-0000-8a33-8109f20d0000 pid=3570 /usr/bin/wget net send-data guuid=346ffcaa-1600-0000-8a33-8109ed0d0000 pid=3565->guuid=a0b527ac-1600-0000-8a33-8109f20d0000 pid=3570 execve guuid=061cb1c0-1600-0000-8a33-81091b0e0000 pid=3611 /usr/bin/chmod guuid=346ffcaa-1600-0000-8a33-8109ed0d0000 pid=3565->guuid=061cb1c0-1600-0000-8a33-81091b0e0000 pid=3611 execve guuid=249003c1-1600-0000-8a33-81091f0e0000 pid=3615 /usr/bin/dash guuid=346ffcaa-1600-0000-8a33-8109ed0d0000 pid=3565->guuid=249003c1-1600-0000-8a33-81091f0e0000 pid=3615 clone guuid=ac7f12c1-1600-0000-8a33-8109200e0000 pid=3616 /usr/bin/rm guuid=346ffcaa-1600-0000-8a33-8109ed0d0000 pid=3565->guuid=ac7f12c1-1600-0000-8a33-8109200e0000 pid=3616 execve guuid=33be5cc1-1600-0000-8a33-8109240e0000 pid=3620 /usr/bin/wget net send-data write-file guuid=346ffcaa-1600-0000-8a33-8109ed0d0000 pid=3565->guuid=33be5cc1-1600-0000-8a33-8109240e0000 pid=3620 execve guuid=afecf2ec-1600-0000-8a33-8109730e0000 pid=3699 /usr/bin/chmod guuid=346ffcaa-1600-0000-8a33-8109ed0d0000 pid=3565->guuid=afecf2ec-1600-0000-8a33-8109730e0000 pid=3699 execve guuid=dc0262ed-1600-0000-8a33-8109740e0000 pid=3700 /usr/bin/dash guuid=346ffcaa-1600-0000-8a33-8109ed0d0000 pid=3565->guuid=dc0262ed-1600-0000-8a33-8109740e0000 pid=3700 clone guuid=d1d14aee-1600-0000-8a33-8109790e0000 pid=3705 /usr/bin/rm guuid=346ffcaa-1600-0000-8a33-8109ed0d0000 pid=3565->guuid=d1d14aee-1600-0000-8a33-8109790e0000 pid=3705 execve guuid=60efc4ee-1600-0000-8a33-81097a0e0000 pid=3706 /usr/bin/wget net send-data write-file guuid=346ffcaa-1600-0000-8a33-8109ed0d0000 pid=3565->guuid=60efc4ee-1600-0000-8a33-81097a0e0000 pid=3706 execve guuid=d93e2a1a-1700-0000-8a33-8109eb0e0000 pid=3819 /usr/bin/chmod guuid=346ffcaa-1600-0000-8a33-8109ed0d0000 pid=3565->guuid=d93e2a1a-1700-0000-8a33-8109eb0e0000 pid=3819 execve guuid=9cdb7d1a-1700-0000-8a33-8109ed0e0000 pid=3821 /usr/bin/dash guuid=346ffcaa-1600-0000-8a33-8109ed0d0000 pid=3565->guuid=9cdb7d1a-1700-0000-8a33-8109ed0e0000 pid=3821 clone guuid=7a7d281b-1700-0000-8a33-8109f00e0000 pid=3824 /usr/bin/rm guuid=346ffcaa-1600-0000-8a33-8109ed0d0000 pid=3565->guuid=7a7d281b-1700-0000-8a33-8109f00e0000 pid=3824 execve guuid=b2fd6f1b-1700-0000-8a33-8109f20e0000 pid=3826 /usr/bin/wget net send-data write-file guuid=346ffcaa-1600-0000-8a33-8109ed0d0000 pid=3565->guuid=b2fd6f1b-1700-0000-8a33-8109f20e0000 pid=3826 execve guuid=fdfa5347-1700-0000-8a33-8109700f0000 pid=3952 /usr/bin/chmod guuid=346ffcaa-1600-0000-8a33-8109ed0d0000 pid=3565->guuid=fdfa5347-1700-0000-8a33-8109700f0000 pid=3952 execve guuid=53589a47-1700-0000-8a33-8109730f0000 pid=3955 /usr/bin/dash guuid=346ffcaa-1600-0000-8a33-8109ed0d0000 pid=3565->guuid=53589a47-1700-0000-8a33-8109730f0000 pid=3955 clone guuid=687c3148-1700-0000-8a33-8109780f0000 pid=3960 /usr/bin/rm guuid=346ffcaa-1600-0000-8a33-8109ed0d0000 pid=3565->guuid=687c3148-1700-0000-8a33-8109780f0000 pid=3960 execve guuid=65d26948-1700-0000-8a33-81097a0f0000 pid=3962 /usr/bin/wget net send-data write-file guuid=346ffcaa-1600-0000-8a33-8109ed0d0000 pid=3565->guuid=65d26948-1700-0000-8a33-81097a0f0000 pid=3962 execve guuid=889d567c-1700-0000-8a33-810904100000 pid=4100 /usr/bin/chmod guuid=346ffcaa-1600-0000-8a33-8109ed0d0000 pid=3565->guuid=889d567c-1700-0000-8a33-810904100000 pid=4100 execve guuid=edb8d07c-1700-0000-8a33-810906100000 pid=4102 /usr/bin/dash guuid=346ffcaa-1600-0000-8a33-8109ed0d0000 pid=3565->guuid=edb8d07c-1700-0000-8a33-810906100000 pid=4102 clone guuid=fde3bd7d-1700-0000-8a33-81090b100000 pid=4107 /usr/bin/rm guuid=346ffcaa-1600-0000-8a33-8109ed0d0000 pid=3565->guuid=fde3bd7d-1700-0000-8a33-81090b100000 pid=4107 execve guuid=f1f61a7e-1700-0000-8a33-81090c100000 pid=4108 /usr/bin/wget net send-data write-file guuid=346ffcaa-1600-0000-8a33-8109ed0d0000 pid=3565->guuid=f1f61a7e-1700-0000-8a33-81090c100000 pid=4108 execve guuid=977974aa-1700-0000-8a33-810979100000 pid=4217 /usr/bin/chmod guuid=346ffcaa-1600-0000-8a33-8109ed0d0000 pid=3565->guuid=977974aa-1700-0000-8a33-810979100000 pid=4217 execve guuid=7984f2aa-1700-0000-8a33-81097b100000 pid=4219 /usr/bin/dash guuid=346ffcaa-1600-0000-8a33-8109ed0d0000 pid=3565->guuid=7984f2aa-1700-0000-8a33-81097b100000 pid=4219 clone guuid=1e21f1ab-1700-0000-8a33-810980100000 pid=4224 /usr/bin/rm delete-file guuid=346ffcaa-1600-0000-8a33-8109ed0d0000 pid=3565->guuid=1e21f1ab-1700-0000-8a33-810980100000 pid=4224 execve ba55188c-1d8c-531d-84cb-0b022f7a1844 23.177.185.39:80 guuid=a0b527ac-1600-0000-8a33-8109f20d0000 pid=3570->ba55188c-1d8c-531d-84cb-0b022f7a1844 send: 132B guuid=33be5cc1-1600-0000-8a33-8109240e0000 pid=3620->ba55188c-1d8c-531d-84cb-0b022f7a1844 send: 133B guuid=60efc4ee-1600-0000-8a33-81097a0e0000 pid=3706->ba55188c-1d8c-531d-84cb-0b022f7a1844 send: 133B guuid=b2fd6f1b-1700-0000-8a33-8109f20e0000 pid=3826->ba55188c-1d8c-531d-84cb-0b022f7a1844 send: 133B guuid=65d26948-1700-0000-8a33-81097a0f0000 pid=3962->ba55188c-1d8c-531d-84cb-0b022f7a1844 send: 133B guuid=f1f61a7e-1700-0000-8a33-81090c100000 pid=4108->ba55188c-1d8c-531d-84cb-0b022f7a1844 send: 133B
Threat name:
Document-HTML.Downloader.Heuristic
Status:
Malicious
First seen:
2025-10-26 15:47:27 UTC
File Type:
Text (Shell)
AV detection:
11 of 38 (28.95%)
Threat level:
  2/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Modifies registry class
Suspicious use of SetWindowsHookEx
Enumerates physical storage devices
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:ach_202412_suspect_bash_script
Author:abuse.ch
Description:Detects suspicious Linux bash scripts

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh 0706cc3e9ebedc0accea81ceca78c6cd10b908425312169d68c24db43e1a3ce3

(this sample)

  
Delivery method
Distributed via web download

Comments