MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 07b727dd1ee8c2b9c8cecc8bdc7ed41459934d32b9235a4f2e58839d1eeee1b6. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 6


Intelligence 6 IOCs YARA 1 File information Comments

SHA256 hash: 07b727dd1ee8c2b9c8cecc8bdc7ed41459934d32b9235a4f2e58839d1eeee1b6
SHA3-384 hash: 48771955904a93324fd1e69b687dee68ab5bfd12e4e14779355ddc79e309fabfe1464a927e238d4ff9865834827d83c7
SHA1 hash: bdeec21b2856c1a9f3354bf718fd7c26d0ebf706
MD5 hash: 22e96f776d40a0c7bced42237a7ce646
humanhash: sink-cat-edward-south
File name:sksk
Download: download sample
Signature Mirai
File size:244 bytes
First seen:2025-12-21 15:13:43 UTC
Last seen:Never
File type: sh
MIME type:text/plain
ssdeep 6:LMFdCNwAK7PhumVMFdAWJNwAbJ78JhumVMFdmSaqA3LKfaoe:odJAkxKdzTwA2DxKdmSaqA3LKyoe
TLSH T1DFD012DF51105521510FDDA82171AB857043E34936201E17ACC510B7E0C4504771C520
Magika txt
Reporter abuse_ch
Tags:sh
URLMalware sample (SHA256 hash)SignatureTags
http://130.12.180.64/zermips0fc47e51b950d0c9feef18299d94898980682002b327e5604c86c6ea9ba51ebc Miraielf mirai ua-wget
http://130.12.180.64/zermpslbad8bf32d2d85ab9261f2236de947c154db5f19a9967c687c8e98a9e23e6d7fe Miraielf mirai ua-wget
http://130.12.180.64/zerarm7bd93f3b53d2702bddb071a835ced4d7e9ba493d72331cd651307ad78da154e74 Miraielf mirai ua-wget

Intelligence


File Origin
# of uploads :
1
# of downloads :
38
Origin country :
DE DE
Vendor Threat Intelligence
No detections
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
mirai
Verdict:
Malicious
File Type:
text
First seen:
2025-12-21T14:41:00Z UTC
Last seen:
2025-12-22T17:04:00Z UTC
Hits:
~10
Status:
terminated
Behavior Graph:
%3 guuid=f80690f4-1900-0000-970c-c1cdc70c0000 pid=3271 /usr/bin/sudo guuid=c49f25f6-1900-0000-970c-c1cdce0c0000 pid=3278 /tmp/sample.bin guuid=f80690f4-1900-0000-970c-c1cdc70c0000 pid=3271->guuid=c49f25f6-1900-0000-970c-c1cdce0c0000 pid=3278 execve guuid=d2ba67f6-1900-0000-970c-c1cdcf0c0000 pid=3279 /usr/bin/wget net send-data write-file guuid=c49f25f6-1900-0000-970c-c1cdce0c0000 pid=3278->guuid=d2ba67f6-1900-0000-970c-c1cdcf0c0000 pid=3279 execve guuid=0f10b6fa-1900-0000-970c-c1cddd0c0000 pid=3293 /usr/bin/chmod guuid=c49f25f6-1900-0000-970c-c1cdce0c0000 pid=3278->guuid=0f10b6fa-1900-0000-970c-c1cddd0c0000 pid=3293 execve guuid=bb98effa-1900-0000-970c-c1cddf0c0000 pid=3295 /usr/bin/dash guuid=c49f25f6-1900-0000-970c-c1cdce0c0000 pid=3278->guuid=bb98effa-1900-0000-970c-c1cddf0c0000 pid=3295 clone guuid=72c185fc-1900-0000-970c-c1cde60c0000 pid=3302 /usr/bin/wget net send-data write-file guuid=c49f25f6-1900-0000-970c-c1cdce0c0000 pid=3278->guuid=72c185fc-1900-0000-970c-c1cde60c0000 pid=3302 execve guuid=d36baf00-1a00-0000-970c-c1cdef0c0000 pid=3311 /usr/bin/chmod guuid=c49f25f6-1900-0000-970c-c1cdce0c0000 pid=3278->guuid=d36baf00-1a00-0000-970c-c1cdef0c0000 pid=3311 execve guuid=b9f1ed00-1a00-0000-970c-c1cdf10c0000 pid=3313 /usr/bin/dash guuid=c49f25f6-1900-0000-970c-c1cdce0c0000 pid=3278->guuid=b9f1ed00-1a00-0000-970c-c1cdf10c0000 pid=3313 clone guuid=ec8b7501-1a00-0000-970c-c1cdf50c0000 pid=3317 /usr/bin/wget net send-data write-file guuid=c49f25f6-1900-0000-970c-c1cdce0c0000 pid=3278->guuid=ec8b7501-1a00-0000-970c-c1cdf50c0000 pid=3317 execve guuid=4e505605-1a00-0000-970c-c1cd000d0000 pid=3328 /usr/bin/chmod guuid=c49f25f6-1900-0000-970c-c1cdce0c0000 pid=3278->guuid=4e505605-1a00-0000-970c-c1cd000d0000 pid=3328 execve guuid=90388b05-1a00-0000-970c-c1cd010d0000 pid=3329 /usr/bin/dash guuid=c49f25f6-1900-0000-970c-c1cdce0c0000 pid=3278->guuid=90388b05-1a00-0000-970c-c1cd010d0000 pid=3329 clone f22fee75-ab34-540d-95fe-696883c6f4ad 130.12.180.64:80 guuid=d2ba67f6-1900-0000-970c-c1cdcf0c0000 pid=3279->f22fee75-ab34-540d-95fe-696883c6f4ad send: 135B guuid=72c185fc-1900-0000-970c-c1cde60c0000 pid=3302->f22fee75-ab34-540d-95fe-696883c6f4ad send: 135B guuid=ec8b7501-1a00-0000-970c-c1cdf50c0000 pid=3317->f22fee75-ab34-540d-95fe-696883c6f4ad send: 135B
Threat name:
Document-HTML.Downloader.Heuristic
Status:
Malicious
First seen:
2025-12-21 15:31:30 UTC
File Type:
Text (Shell)
AV detection:
7 of 36 (19.44%)
Threat level:
  2/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Modifies registry class
Suspicious use of SetWindowsHookEx
Enumerates physical storage devices
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:MAL_Linux_IoT_MultiArch_BotnetLoader_Generic
Author:Anish Bogati
Description:Technique-based detection of IoT/Linux botnet loader shell scripts downloading binaries from numeric IPs, chmodding, and executing multi-architecture payloads
Reference:MalwareBazaar sample lilin.sh

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh 07b727dd1ee8c2b9c8cecc8bdc7ed41459934d32b9235a4f2e58839d1eeee1b6

(this sample)

  
Delivery method
Distributed via web download

Comments