MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 09a730a356ccab9e58a6a3011e0482826d8eb2f24d1b9c76611e50626d0a657f. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: 09a730a356ccab9e58a6a3011e0482826d8eb2f24d1b9c76611e50626d0a657f
SHA3-384 hash: 25a1fd57c1d089f4bf4b73ab103be50489339c46185451eea297bb58dd06f6f4e79504730b6529879040a4c8c201fc3e
SHA1 hash: 640930a63ae133645d1470f0bb23ad32143b881e
MD5 hash: e5123d2ecf439f66c1abb7daae3210a3
humanhash: montana-fish-carbon-december
File name:acurl.sh
Download: download sample
Signature Mirai
File size:677 bytes
First seen:2025-11-19 08:32:42 UTC
Last seen:2025-11-20 01:25:29 UTC
File type: sh
MIME type:text/x-shellscript
ssdeep 12:KhI5W3CtI1/TbNZ7BwqL7Zg1npLO4C7Z62kC7ZOzliAEEZ7Znzqld7ZhoJiw7Zl1:KOQyS1bbzBbW1npLO6vLliANzql5oJt1
TLSH T11D01F78C81466E53260DCD56B393442D117EE7CDB5DE2BD0FEC8EAEC86C078E6019AD6
TrID 70.0% (.SH) Linux/UNIX shell script (7000/1)
30.0% (.) Unix-like shebang (var.3) (gen) (3000/1)
Magika shell
Reporter abuse_ch
Tags:sh
URLMalware sample (SHA256 hash)SignatureTags
http://183.81.33.194/arm39ccf5403edb501d79b7d765ec915f3bf78840ecc9ae4ded56e205a539b33ff1 Mirai32-bit elf mirai Mozi
http://183.81.33.194/arm537630084dd10bbd25b42984dd63fbc1cd05714615a31f1b1dd90a86b8e7100d1 Miraiarm elf geofenced mirai ua-wget USA
http://183.81.33.194/arm7ca4bd50228d92ac1266506b2ac7fb5636638bd6f3e8ae710fc373c41189ada26 Miraiarm elf geofenced mirai ua-wget USA
http://183.81.33.194/mips08fe033056f2f363637df7eaa1395592cb81e9fe81cd47c0ebd4179dae842f31 Miraielf geofenced mips mirai ua-wget USA
http://183.81.33.194/mpsl1722e1c45b9505351948ded6293528b5baeeba06c892f13ba028e49fb0611797 Miraielf geofenced mips mirai ua-wget USA
http://183.81.33.194/arc06693d6a05d2458d13aa8de434f5651a933ca8ffc1eee7a7ce0e3fe3c087db54 Miraielf mirai
http://183.81.33.194/aarch64bcfc9d2b50bf532f047d666f88c4fa2de9410b40d8a339c840cce3fb69037ec9 Miraielf mirai

Intelligence


File Origin
# of uploads :
2
# of downloads :
39
Origin country :
DE DE
Vendor Threat Intelligence
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
evasive mirai
Verdict:
Malicious
File Type:
unix shell
First seen:
2025-11-18T23:55:00Z UTC
Last seen:
2025-11-20T23:49:00Z UTC
Hits:
~100
Status:
terminated
Behavior Graph:
%3 guuid=9e438bb7-1600-0000-57a2-2e85f20c0000 pid=3314 /usr/bin/sudo guuid=d083b1b9-1600-0000-57a2-2e85f30c0000 pid=3315 /tmp/sample.bin guuid=9e438bb7-1600-0000-57a2-2e85f20c0000 pid=3314->guuid=d083b1b9-1600-0000-57a2-2e85f30c0000 pid=3315 execve guuid=6dd2edb9-1600-0000-57a2-2e85f40c0000 pid=3316 /usr/bin/rm guuid=d083b1b9-1600-0000-57a2-2e85f30c0000 pid=3315->guuid=6dd2edb9-1600-0000-57a2-2e85f40c0000 pid=3316 execve guuid=38c433ba-1600-0000-57a2-2e85f50c0000 pid=3317 /usr/bin/rm guuid=d083b1b9-1600-0000-57a2-2e85f30c0000 pid=3315->guuid=38c433ba-1600-0000-57a2-2e85f50c0000 pid=3317 execve guuid=cbbf26bb-1600-0000-57a2-2e85f60c0000 pid=3318 /usr/bin/rm guuid=d083b1b9-1600-0000-57a2-2e85f30c0000 pid=3315->guuid=cbbf26bb-1600-0000-57a2-2e85f60c0000 pid=3318 execve guuid=15fe97bb-1600-0000-57a2-2e85f70c0000 pid=3319 /usr/bin/rm guuid=d083b1b9-1600-0000-57a2-2e85f30c0000 pid=3315->guuid=15fe97bb-1600-0000-57a2-2e85f70c0000 pid=3319 execve guuid=531af2bb-1600-0000-57a2-2e85f80c0000 pid=3320 /usr/bin/rm guuid=d083b1b9-1600-0000-57a2-2e85f30c0000 pid=3315->guuid=531af2bb-1600-0000-57a2-2e85f80c0000 pid=3320 execve guuid=efed42bc-1600-0000-57a2-2e85f90c0000 pid=3321 /usr/bin/rm guuid=d083b1b9-1600-0000-57a2-2e85f30c0000 pid=3315->guuid=efed42bc-1600-0000-57a2-2e85f90c0000 pid=3321 execve guuid=d6bcabbc-1600-0000-57a2-2e85fa0c0000 pid=3322 /usr/bin/rm guuid=d083b1b9-1600-0000-57a2-2e85f30c0000 pid=3315->guuid=d6bcabbc-1600-0000-57a2-2e85fa0c0000 pid=3322 execve guuid=74de1abd-1600-0000-57a2-2e85fb0c0000 pid=3323 /usr/bin/curl net send-data write-file guuid=d083b1b9-1600-0000-57a2-2e85f30c0000 pid=3315->guuid=74de1abd-1600-0000-57a2-2e85fb0c0000 pid=3323 execve guuid=83e66001-1700-0000-57a2-2e85850d0000 pid=3461 /usr/bin/chmod guuid=d083b1b9-1600-0000-57a2-2e85f30c0000 pid=3315->guuid=83e66001-1700-0000-57a2-2e85850d0000 pid=3461 execve guuid=513bc101-1700-0000-57a2-2e85870d0000 pid=3463 /usr/bin/dash guuid=d083b1b9-1600-0000-57a2-2e85f30c0000 pid=3315->guuid=513bc101-1700-0000-57a2-2e85870d0000 pid=3463 clone guuid=e7c2c502-1700-0000-57a2-2e858a0d0000 pid=3466 /usr/bin/curl net send-data write-file guuid=d083b1b9-1600-0000-57a2-2e85f30c0000 pid=3315->guuid=e7c2c502-1700-0000-57a2-2e858a0d0000 pid=3466 execve guuid=aa61be53-1700-0000-57a2-2e850e0e0000 pid=3598 /usr/bin/chmod guuid=d083b1b9-1600-0000-57a2-2e85f30c0000 pid=3315->guuid=aa61be53-1700-0000-57a2-2e850e0e0000 pid=3598 execve guuid=83152e54-1700-0000-57a2-2e85100e0000 pid=3600 /usr/bin/dash guuid=d083b1b9-1600-0000-57a2-2e85f30c0000 pid=3315->guuid=83152e54-1700-0000-57a2-2e85100e0000 pid=3600 clone guuid=8c961555-1700-0000-57a2-2e85130e0000 pid=3603 /usr/bin/curl net send-data write-file guuid=d083b1b9-1600-0000-57a2-2e85f30c0000 pid=3315->guuid=8c961555-1700-0000-57a2-2e85130e0000 pid=3603 execve guuid=6424fe98-1700-0000-57a2-2e85750e0000 pid=3701 /usr/bin/chmod guuid=d083b1b9-1600-0000-57a2-2e85f30c0000 pid=3315->guuid=6424fe98-1700-0000-57a2-2e85750e0000 pid=3701 execve guuid=2b7b4999-1700-0000-57a2-2e85780e0000 pid=3704 /usr/bin/dash guuid=d083b1b9-1600-0000-57a2-2e85f30c0000 pid=3315->guuid=2b7b4999-1700-0000-57a2-2e85780e0000 pid=3704 clone guuid=2346479a-1700-0000-57a2-2e857e0e0000 pid=3710 /usr/bin/curl net send-data write-file guuid=d083b1b9-1600-0000-57a2-2e85f30c0000 pid=3315->guuid=2346479a-1700-0000-57a2-2e857e0e0000 pid=3710 execve guuid=cc3843da-1700-0000-57a2-2e85880f0000 pid=3976 /usr/bin/chmod guuid=d083b1b9-1600-0000-57a2-2e85f30c0000 pid=3315->guuid=cc3843da-1700-0000-57a2-2e85880f0000 pid=3976 execve guuid=baf1c7da-1700-0000-57a2-2e858a0f0000 pid=3978 /usr/bin/dash guuid=d083b1b9-1600-0000-57a2-2e85f30c0000 pid=3315->guuid=baf1c7da-1700-0000-57a2-2e858a0f0000 pid=3978 clone guuid=cf44e6dc-1700-0000-57a2-2e858f0f0000 pid=3983 /usr/bin/curl net send-data write-file guuid=d083b1b9-1600-0000-57a2-2e85f30c0000 pid=3315->guuid=cf44e6dc-1700-0000-57a2-2e858f0f0000 pid=3983 execve guuid=b7cb372d-1800-0000-57a2-2e8542100000 pid=4162 /usr/bin/chmod guuid=d083b1b9-1600-0000-57a2-2e85f30c0000 pid=3315->guuid=b7cb372d-1800-0000-57a2-2e8542100000 pid=4162 execve guuid=5639b02d-1800-0000-57a2-2e8544100000 pid=4164 /usr/bin/dash guuid=d083b1b9-1600-0000-57a2-2e85f30c0000 pid=3315->guuid=5639b02d-1800-0000-57a2-2e8544100000 pid=4164 clone guuid=62e5b52e-1800-0000-57a2-2e8548100000 pid=4168 /usr/bin/curl net send-data write-file guuid=d083b1b9-1600-0000-57a2-2e85f30c0000 pid=3315->guuid=62e5b52e-1800-0000-57a2-2e8548100000 pid=4168 execve guuid=4ffaea76-1800-0000-57a2-2e8550110000 pid=4432 /usr/bin/chmod guuid=d083b1b9-1600-0000-57a2-2e85f30c0000 pid=3315->guuid=4ffaea76-1800-0000-57a2-2e8550110000 pid=4432 execve guuid=c1b56077-1800-0000-57a2-2e8552110000 pid=4434 /usr/bin/dash guuid=d083b1b9-1600-0000-57a2-2e85f30c0000 pid=3315->guuid=c1b56077-1800-0000-57a2-2e8552110000 pid=4434 clone guuid=25d2df78-1800-0000-57a2-2e8558110000 pid=4440 /usr/bin/curl net send-data write-file guuid=d083b1b9-1600-0000-57a2-2e85f30c0000 pid=3315->guuid=25d2df78-1800-0000-57a2-2e8558110000 pid=4440 execve guuid=ba49a9bb-1800-0000-57a2-2e85be110000 pid=4542 /usr/bin/chmod guuid=d083b1b9-1600-0000-57a2-2e85f30c0000 pid=3315->guuid=ba49a9bb-1800-0000-57a2-2e85be110000 pid=4542 execve guuid=5bd40fbc-1800-0000-57a2-2e85bf110000 pid=4543 /usr/bin/dash guuid=d083b1b9-1600-0000-57a2-2e85f30c0000 pid=3315->guuid=5bd40fbc-1800-0000-57a2-2e85bf110000 pid=4543 clone 3e6fbf2c-0051-5851-89c0-e187a4cef436 183.81.33.194:80 guuid=74de1abd-1600-0000-57a2-2e85fb0c0000 pid=3323->3e6fbf2c-0051-5851-89c0-e187a4cef436 send: 80B guuid=e7c2c502-1700-0000-57a2-2e858a0d0000 pid=3466->3e6fbf2c-0051-5851-89c0-e187a4cef436 send: 81B guuid=8c961555-1700-0000-57a2-2e85130e0000 pid=3603->3e6fbf2c-0051-5851-89c0-e187a4cef436 send: 81B guuid=2346479a-1700-0000-57a2-2e857e0e0000 pid=3710->3e6fbf2c-0051-5851-89c0-e187a4cef436 send: 81B guuid=cf44e6dc-1700-0000-57a2-2e858f0f0000 pid=3983->3e6fbf2c-0051-5851-89c0-e187a4cef436 send: 81B guuid=62e5b52e-1800-0000-57a2-2e8548100000 pid=4168->3e6fbf2c-0051-5851-89c0-e187a4cef436 send: 80B guuid=25d2df78-1800-0000-57a2-2e8558110000 pid=4440->3e6fbf2c-0051-5851-89c0-e187a4cef436 send: 84B
Threat name:
Document-HTML.Trojan.Heuristic
Status:
Malicious
First seen:
2025-11-19 03:50:05 UTC
File Type:
Text (Shell)
AV detection:
7 of 36 (19.44%)
Threat level:
  2/5
Result
Malware family:
n/a
Score:
  9/10
Tags:
antivm credential_access defense_evasion discovery linux
Behaviour
Reads runtime system information
System Network Configuration Discovery
Writes file to tmp directory
Changes its process name
Checks CPU configuration
Reads process memory
Creates a large amount of network flows
Deletes log files
Enumerates running processes
File and Directory Permissions Modification
Deletes system logs
Executes dropped EXE
Renames itself
Unexpected DNS network traffic destination
Contacts a large (13458) amount of remote hosts
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh 09a730a356ccab9e58a6a3011e0482826d8eb2f24d1b9c76611e50626d0a657f

(this sample)

  
Delivery method
Distributed via web download

Comments