MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 09f97e33480bb2301e5fdad95de9d84a1c151ca2bf7443e1f8f494452e8ad007. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 9


Intelligence 9 IOCs YARA 1 File information Comments

SHA256 hash: 09f97e33480bb2301e5fdad95de9d84a1c151ca2bf7443e1f8f494452e8ad007
SHA3-384 hash: a3fc1457b424a1ba8f5c8a73c70ab77a4b3593c8813084411584c9ef052458eb9c3444f8c3ee9ec510ad4633c9101895
SHA1 hash: 3f97f480a927183f08e8714be4b71464ebabfe15
MD5 hash: 83fea6c6cd1813f535d910903a1c143e
humanhash: london-indigo-thirteen-pennsylvania
File name:ssh_config_upd.sh
Download: download sample
Signature Mirai
File size:4'169 bytes
First seen:2026-01-31 21:14:49 UTC
Last seen:Never
File type: sh
MIME type:text/x-shellscript
ssdeep 24:ID+BVPXrTeMQEriLDdX/4HcrT6gPrfvCcbcfq5TBrvRz8ubrD6Pt2oF3rC9HDrtS:HZQndrfRokddjk19kcwbyJN
TLSH T179815BE722224FBAC3040F56F550C943E282C9E4E6B3B158B9447D66B5D8F38BC4DB96
TrID 70.0% (.SH) Linux/UNIX shell script (7000/1)
30.0% (.) Unix-like shebang (var.3) (gen) (3000/1)
Magika shell
Reporter abuse_ch
Tags:mirai sh
URLMalware sample (SHA256 hash)SignatureTags
http://45.135.194.29/auth-token/ssh-agent-auth.x8615bb9d9ae8dec61620e412df05368ab53f3cece5a93a74b4fc06341753b11e26 Miraielf geofenced mirai ua-wget USA x86
http://45.135.194.29/auth-token/ssh-agent-auth.mips3df0c473d8f1f9d49d44e03f4e8ffc2539f3742edc4d602aba548419b936f7c4 Miraielf geofenced mips mirai ua-wget USA
http://45.135.194.29/auth-token/ssh-agent-auth.arcn/an/aelf ua-wget
http://45.135.194.29/auth-token/ssh-agent-auth.i468n/an/aelf ua-wget
http://45.135.194.29/auth-token/ssh-agent-auth.i686n/an/aelf ua-wget
http://45.135.194.29/auth-token/ssh-agent-auth.x86_64c1fc75d7e279d839d8762c174a29f40f38a10d4f21e01d3a1a1881d3b407fe56 Miraielf geofenced mirai ua-wget USA x86
http://45.135.194.29/auth-token/ssh-agent-auth.mpsl545f3cee26f42cfb09ce2ccb6d70fc6fbebecb42eb11fd2f72172dbbd6581883 Miraielf geofenced mips mirai ua-wget USA
http://45.135.194.29/auth-token/ssh-agent-auth.armn/an/aarm elf geofenced ua-wget USA
http://45.135.194.29/auth-token/ssh-agent-auth.arm5n/an/aarm elf geofenced ua-wget USA
http://45.135.194.29/auth-token/ssh-agent-auth.arm66e950129f1e09bcc5d7299effc0a15850b6c6b778e01874d604cca7ef2ed0143 Miraiarm elf geofenced mirai ua-wget USA
http://45.135.194.29/auth-token/ssh-agent-auth.arm74764c496d2e6fd15973f5548e02911b916841621ba947fc3995bb7baa9bb0cb9 Miraiarm elf geofenced mirai ua-wget USA
http://45.135.194.29/auth-token/ssh-agent-auth.ppcd6094e60d369617adc2129eaf39fdbd7503e4f4a0382978c62c38efe1257cfea Miraielf geofenced mirai PowerPC ua-wget USA
http://45.135.194.29/auth-token/ssh-agent-auth.spc523e36ffff2bf201b288d2a55d0be47a86e3babc481c97bc05c9af3063d34c08 Miraielf geofenced mirai sparc ua-wget USA
http://45.135.194.29/auth-token/ssh-agent-auth.m68k882127ddf223d236b82258b8ac9dbb32d754f05b9350ef51296e56b1073554ec Miraielf geofenced m68k mirai ua-wget USA
http://45.135.194.29/auth-token/ssh-agent-auth.sh41f35a705d6f3d89e5c68283380cdb4914d8300d6ac6410190278e06d628b90bf Miraielf geofenced mirai SuperH ua-wget USA

Intelligence


File Origin
# of uploads :
1
# of downloads :
77
Origin country :
DE DE
Vendor Threat Intelligence
No detections
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
evasive mirai
Verdict:
Malicious
File Type:
unix shell
First seen:
2026-01-31T18:22:00Z UTC
Last seen:
2026-02-01T06:10:00Z UTC
Hits:
~10
Detections:
HEUR:Trojan-Downloader.Shell.Agent.gen
Threat name:
Text.Trojan.Generic
Status:
Suspicious
First seen:
2026-01-31 21:15:31 UTC
File Type:
Text (Shell)
AV detection:
7 of 24 (29.17%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:mirai antivm botnet defense_evasion discovery linux persistence upx
Behaviour
Reads runtime system information
Writes file to tmp directory
Changes its process name
Checks CPU configuration
UPX packed file
Deletes log files
Enumerates running processes
Modifies init.d
Modifies rc script
File and Directory Permissions Modification
Deletes Audit logs
Deletes itself
Deletes journal logs
Deletes system logs
Executes dropped EXE
Traces itself
Mirai
Mirai family
Malware Config
C2 Extraction:
45.135.194.29
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:MAL_Linux_IoT_MultiArch_BotnetLoader_Generic
Author:Anish Bogati
Description:Technique-based detection of IoT/Linux botnet loader shell scripts downloading binaries from numeric IPs, chmodding, and executing multi-architecture payloads
Reference:MalwareBazaar sample lilin.sh

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh 09f97e33480bb2301e5fdad95de9d84a1c151ca2bf7443e1f8f494452e8ad007

(this sample)

  
Delivery method
Distributed via web download

Comments