MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 0a2b107eabb7a1cf3c9774c4d505745f1b5494d0864e33b2335eec869393c10a. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 6


Intelligence 6 IOCs YARA 1 File information Comments

SHA256 hash: 0a2b107eabb7a1cf3c9774c4d505745f1b5494d0864e33b2335eec869393c10a
SHA3-384 hash: d0ed1489424fadedab9a65b3386f5d2b32fab9d76e72a5593802fb70fbdd119a4e084d1e135896b5210de80895eb7f4f
SHA1 hash: 87e0f7deb9c1bdafceff345efaecd568d97a8675
MD5 hash: 0d9cb473f1c9071c518ea3e101ec35d7
humanhash: eleven-timing-fanta-social
File name:payload.sh
Download: download sample
File size:2'212 bytes
First seen:2026-01-25 09:32:30 UTC
Last seen:Never
File type: sh
MIME type:text/x-shellscript
ssdeep 48:FxKiu8iM/7p/GOTjHCp1SnAKXWTXsagDCx8gU7H6f:FIyz/lTjXAKXUcL+x8ggHE
TLSH T1B641BFC8301023D1356BEEE4BA7AC5D6E283D592B5D84104F8CD94B48FBC93065DDE75
TrID 70.0% (.SH) Linux/UNIX shell script (7000/1)
30.0% (.) Unix-like shebang (var.3) (gen) (3000/1)
Magika shell
Reporter abuse_ch
Tags:sh
URLMalware sample (SHA256 hash)SignatureTags
http://64.34.87.123/x86be3a4eb158b778b1bb36560959317265b9699b283f8fb595a25898aced5d3299 Mirai32-bit elf mirai Mozi
http://64.34.87.123/mipscb5bfe0ea43cb35262a5d94b8cc9e6df5067e267b605cf45a9845d9535a6d309 Mirai32-bit elf mirai Mozi
http://64.34.87.123/mpsl3c30abaaa5645d6e09cb07aede0d97adbb28123b9ed309170f33af63aa232fdb Miraielf mirai ua-wget
http://64.34.87.123/armf1d66a02dd25bced105fd72b49fdc493fd1cd6458e96cd41be8a48119f280e9d Mirai32-bit elf mirai Mozi
http://64.34.87.123/arm5a8c2004f02da42f50f9ecb96eaeea2fc081166d10a7fbf440f6c31544c065a27 Miraielf mirai ua-wget
http://64.34.87.123/arm61dd459cfe947a16429e8b4e31b48d14e386864ca8e246f9a729440f827ebe285 Miraielf mirai ua-wget
http://64.34.87.123/arm7fec6c36fb55149807721c8b729f34abdd9a4c82aae2a6ee28fb3f4e9a19f41c5 Miraielf mirai ua-wget
http://64.34.87.123/ppc7ff00b8d828ceec40fe464278c85692f8cd041b883b7d69ceba7cee471c895e5 Miraielf mirai ua-wget
http://64.34.87.123/m68k6940b214ee175e9d43e168d90f50052cf055a6ff72f7da9ae9b92ba29afb30fb Miraielf mirai ua-wget
http://64.34.87.123/sh4acefaead28acb62560addd6405d479bfe1aad45235051b6d3e0bf6688f88d42b Miraielf mirai ua-wget

Intelligence


File Origin
# of uploads :
1
# of downloads :
34
Origin country :
DE DE
Vendor Threat Intelligence
No detections
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
bash busybox lolbin mirai
Result
Gathering data
Verdict:
Malicious
Threat:
Trojan-Downloader.Shell.Agent
Threat name:
Script-Shell.Worm.Mirai
Status:
Malicious
First seen:
2026-01-25 09:33:41 UTC
File Type:
Text (Shell)
AV detection:
12 of 36 (33.33%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  1/10
Tags:
linux
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:MAL_Linux_IoT_MultiArch_BotnetLoader_Generic
Author:Anish Bogati
Description:Technique-based detection of IoT/Linux botnet loader shell scripts downloading binaries from numeric IPs, chmodding, and executing multi-architecture payloads
Reference:MalwareBazaar sample lilin.sh

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

sh 0a2b107eabb7a1cf3c9774c4d505745f1b5494d0864e33b2335eec869393c10a

(this sample)

  
Delivery method
Distributed via web download

Comments