MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 0bdd42672c0f44295c963ef75642ff6fa95bbada4d9eb3c08a29d1aac4eb7caa. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 8


Intelligence 8 IOCs YARA File information Comments

SHA256 hash: 0bdd42672c0f44295c963ef75642ff6fa95bbada4d9eb3c08a29d1aac4eb7caa
SHA3-384 hash: 6ef3db78c39ec84231d11660fba0cd1fbc0bdf5ad556bd14b32f7346584aeb074a343bad6bb521557af987e4082c18e4
SHA1 hash: 495ab15d0d5439d4e0fc60a91d46f048978b8708
MD5 hash: 9c39072c6984817336178bf889e186b0
humanhash: rugby-may-delta-carolina
File name:check1.sh
Download: download sample
Signature Mirai
File size:1'224 bytes
First seen:2026-02-26 04:47:21 UTC
Last seen:Never
File type: sh
MIME type:text/x-shellscript
ssdeep 24:VUeYj+H1gPDMK9CFdYhEnHQBYcduuD9I5MCPCARiy3AnQZaZl1cSRs/:VUeYj+H1gPDMK9CnYhEkDlCPCuiywOjJ
TLSH T1622102816B217DB92CC8456F62AA54597142132F492F2FA4B4D9AEB71F0C480F2E4FB4
TrID 70.0% (.SH) Linux/UNIX shell script (7000/1)
30.0% (.) Unix-like shebang (var.3) (gen) (3000/1)
Magika shell
Reporter abuse_ch
Tags:mirai sh
URLMalware sample (SHA256 hash)SignatureTags
http://64.120.95.129/check1.sh0bdd42672c0f44295c963ef75642ff6fa95bbada4d9eb3c08a29d1aac4eb7caa Miraish ua-wget
http://64.120.95.129/Error840c4bfa96b30bf3046a70d8a0143ed419a7cd58b55091c85da619a8a22cd31e1b Miraielf miner mirai ua-wget

Intelligence


File Origin
# of uploads :
1
# of downloads :
82
Origin country :
DE DE
Vendor Threat Intelligence
No detections
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
bash lolbin
Result
Gathering data
Threat name:
Linux.Downloader.Generic
Status:
Suspicious
First seen:
2026-02-26 04:48:26 UTC
File Type:
Text (Shell)
AV detection:
4 of 36 (11.11%)
Threat level:
  3/5
Result
Malware family:
Score:
  10/10
Tags:
family:xmrig antivm defense_evasion discovery execution linux miner persistence privilege_escalation
Behaviour
Command and Scripting Interpreter: Unix Shell
Reads runtime system information
Checks CPU configuration
Reads CPU attributes
Creates/modifies Cron job
Deletes log files
Enumerates running processes
File and Directory Permissions Modification
Indicator Removal: Clear Command History
Executes dropped EXE
XMRig Miner payload
Xmrig family
xmrig
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh 0bdd42672c0f44295c963ef75642ff6fa95bbada4d9eb3c08a29d1aac4eb7caa

(this sample)

  
Delivery method
Distributed via web download

Comments