MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 0e6fbbe09430717dd44c4719ccc184a791d0d1f27f5f457fc29d8ac309f54c02. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: 0e6fbbe09430717dd44c4719ccc184a791d0d1f27f5f457fc29d8ac309f54c02
SHA3-384 hash: 793090fd1ccfa68aec77013a19dc72bc869babe69ae794f76cbffa41bb28d24dcd695ef5a04596e349957b0865e6e674
SHA1 hash: cc30ceb372182f6373bd64281571bc09c7d7bf02
MD5 hash: 3bc33b25613873e9092623f3000dfeec
humanhash: montana-uranus-leopard-one
File name:router.zyxel.sh
Download: download sample
Signature Mirai
File size:714 bytes
First seen:2025-08-23 02:10:27 UTC
Last seen:2025-08-23 14:02:18 UTC
File type: sh
MIME type:text/plain
ssdeep 12:7pzcs6RzcXWzUf6KZzcXTmz6KYhzcqaOEd6Ezcc6Y0zc5Vd6y:l+BJeEzx7HboaY4vy
TLSH T18A0156AF581CB209B4F8DB02B81387005B0D9297DCD41F90A78C7C7ACB8EC18E565A46
Magika shell
Reporter abuse_ch
Tags:sh
URLMalware sample (SHA256 hash)SignatureTags
http://196.251.69.194/kitty.arm824235df77016d1aad750a9f52919f521f7354f124a9d710d4a3c98d4b64615f Ngiowebelf mirai Ngioweb ua-wget
http://196.251.69.194/kitty.mipsn/an/aelf mirai ua-wget
http://196.251.69.194/kitty.mipselcb93ba4bdeca9b98b820e6a54f5ce7259c6dea673d8ee2b92e88d39f70efb8ea Miraielf mirai ua-wget
http://196.251.69.194/kitty.aarch641a930b4aa7c5f6e140466a8309037bf5def5614f7ed514bd9010868b8f51710b Tsunamielf mirai Tsunami ua-wget
http://196.251.69.194/kitty.x86f9f93bed6018700b5d961c16acd4bff913c697831df29fa1d91dafcdd50686ec Miraielf mirai ua-wget
http://196.251.69.194/kitty.x86_64n/an/aelf mirai ua-wget

Intelligence


File Origin
# of uploads :
2
# of downloads :
26
Origin country :
DE DE
Vendor Threat Intelligence
Verdict:
Malicious
File Type:
text
First seen:
2025-08-22T23:33:00Z UTC
Last seen:
2025-08-22T23:33:00Z UTC
Hits:
~10
Detections:
HEUR:Trojan-Downloader.Shell.Agent.p HEUR:Trojan-Downloader.Shell.Agent.a
Status:
terminated
Behavior Graph:
%3 guuid=f4f52989-1b00-0000-db02-8e3f530c0000 pid=3155 /usr/bin/sudo guuid=a6d9708b-1b00-0000-db02-8e3f580c0000 pid=3160 /tmp/sample.bin guuid=f4f52989-1b00-0000-db02-8e3f530c0000 pid=3155->guuid=a6d9708b-1b00-0000-db02-8e3f580c0000 pid=3160 execve guuid=451fb98b-1b00-0000-db02-8e3f590c0000 pid=3161 /usr/bin/wget net send-data write-file guuid=a6d9708b-1b00-0000-db02-8e3f580c0000 pid=3160->guuid=451fb98b-1b00-0000-db02-8e3f590c0000 pid=3161 execve guuid=ffa36c94-1b00-0000-db02-8e3f670c0000 pid=3175 /usr/bin/chmod guuid=a6d9708b-1b00-0000-db02-8e3f580c0000 pid=3160->guuid=ffa36c94-1b00-0000-db02-8e3f670c0000 pid=3175 execve guuid=63afe894-1b00-0000-db02-8e3f680c0000 pid=3176 /usr/bin/dash guuid=a6d9708b-1b00-0000-db02-8e3f580c0000 pid=3160->guuid=63afe894-1b00-0000-db02-8e3f680c0000 pid=3176 clone guuid=b6ef6696-1b00-0000-db02-8e3f6a0c0000 pid=3178 /usr/bin/rm delete-file guuid=a6d9708b-1b00-0000-db02-8e3f580c0000 pid=3160->guuid=b6ef6696-1b00-0000-db02-8e3f6a0c0000 pid=3178 execve guuid=fe58d196-1b00-0000-db02-8e3f6b0c0000 pid=3179 /usr/bin/wget net send-data write-file guuid=a6d9708b-1b00-0000-db02-8e3f580c0000 pid=3160->guuid=fe58d196-1b00-0000-db02-8e3f6b0c0000 pid=3179 execve guuid=6398bd9d-1b00-0000-db02-8e3f6c0c0000 pid=3180 /usr/bin/chmod guuid=a6d9708b-1b00-0000-db02-8e3f580c0000 pid=3160->guuid=6398bd9d-1b00-0000-db02-8e3f6c0c0000 pid=3180 execve guuid=e1a0379e-1b00-0000-db02-8e3f6d0c0000 pid=3181 /usr/bin/dash guuid=a6d9708b-1b00-0000-db02-8e3f580c0000 pid=3160->guuid=e1a0379e-1b00-0000-db02-8e3f6d0c0000 pid=3181 clone guuid=e43df19e-1b00-0000-db02-8e3f6f0c0000 pid=3183 /usr/bin/rm delete-file guuid=a6d9708b-1b00-0000-db02-8e3f580c0000 pid=3160->guuid=e43df19e-1b00-0000-db02-8e3f6f0c0000 pid=3183 execve guuid=2e45589f-1b00-0000-db02-8e3f700c0000 pid=3184 /usr/bin/wget net send-data write-file guuid=a6d9708b-1b00-0000-db02-8e3f580c0000 pid=3160->guuid=2e45589f-1b00-0000-db02-8e3f700c0000 pid=3184 execve guuid=9d1e39a6-1b00-0000-db02-8e3f720c0000 pid=3186 /usr/bin/chmod guuid=a6d9708b-1b00-0000-db02-8e3f580c0000 pid=3160->guuid=9d1e39a6-1b00-0000-db02-8e3f720c0000 pid=3186 execve guuid=141ec3a6-1b00-0000-db02-8e3f730c0000 pid=3187 /usr/bin/dash guuid=a6d9708b-1b00-0000-db02-8e3f580c0000 pid=3160->guuid=141ec3a6-1b00-0000-db02-8e3f730c0000 pid=3187 clone guuid=b988ada7-1b00-0000-db02-8e3f760c0000 pid=3190 /usr/bin/rm delete-file guuid=a6d9708b-1b00-0000-db02-8e3f580c0000 pid=3160->guuid=b988ada7-1b00-0000-db02-8e3f760c0000 pid=3190 execve guuid=74e618a8-1b00-0000-db02-8e3f780c0000 pid=3192 /usr/bin/wget net send-data write-file guuid=a6d9708b-1b00-0000-db02-8e3f580c0000 pid=3160->guuid=74e618a8-1b00-0000-db02-8e3f780c0000 pid=3192 execve guuid=dc044eae-1b00-0000-db02-8e3f890c0000 pid=3209 /usr/bin/chmod guuid=a6d9708b-1b00-0000-db02-8e3f580c0000 pid=3160->guuid=dc044eae-1b00-0000-db02-8e3f890c0000 pid=3209 execve guuid=d18baeae-1b00-0000-db02-8e3f8a0c0000 pid=3210 /usr/bin/dash guuid=a6d9708b-1b00-0000-db02-8e3f580c0000 pid=3160->guuid=d18baeae-1b00-0000-db02-8e3f8a0c0000 pid=3210 clone guuid=c53b8daf-1b00-0000-db02-8e3f8e0c0000 pid=3214 /usr/bin/rm delete-file guuid=a6d9708b-1b00-0000-db02-8e3f580c0000 pid=3160->guuid=c53b8daf-1b00-0000-db02-8e3f8e0c0000 pid=3214 execve guuid=a83cefaf-1b00-0000-db02-8e3f900c0000 pid=3216 /usr/bin/wget net send-data write-file guuid=a6d9708b-1b00-0000-db02-8e3f580c0000 pid=3160->guuid=a83cefaf-1b00-0000-db02-8e3f900c0000 pid=3216 execve guuid=319c91b6-1b00-0000-db02-8e3f9e0c0000 pid=3230 /usr/bin/chmod guuid=a6d9708b-1b00-0000-db02-8e3f580c0000 pid=3160->guuid=319c91b6-1b00-0000-db02-8e3f9e0c0000 pid=3230 execve guuid=79a4d4b6-1b00-0000-db02-8e3fa00c0000 pid=3232 /tmp/kitty.x86 guuid=a6d9708b-1b00-0000-db02-8e3f580c0000 pid=3160->guuid=79a4d4b6-1b00-0000-db02-8e3fa00c0000 pid=3232 execve guuid=239a03b7-1b00-0000-db02-8e3fa30c0000 pid=3235 /usr/bin/rm guuid=a6d9708b-1b00-0000-db02-8e3f580c0000 pid=3160->guuid=239a03b7-1b00-0000-db02-8e3fa30c0000 pid=3235 execve guuid=02424bb7-1b00-0000-db02-8e3fa40c0000 pid=3236 /usr/bin/wget net send-data write-file guuid=a6d9708b-1b00-0000-db02-8e3f580c0000 pid=3160->guuid=02424bb7-1b00-0000-db02-8e3fa40c0000 pid=3236 execve guuid=711aa0c6-1b00-0000-db02-8e3fa50c0000 pid=3237 /usr/bin/chmod guuid=a6d9708b-1b00-0000-db02-8e3f580c0000 pid=3160->guuid=711aa0c6-1b00-0000-db02-8e3fa50c0000 pid=3237 execve guuid=bc410ac7-1b00-0000-db02-8e3fa60c0000 pid=3238 /tmp/kitty.x86_64 guuid=a6d9708b-1b00-0000-db02-8e3f580c0000 pid=3160->guuid=bc410ac7-1b00-0000-db02-8e3fa60c0000 pid=3238 execve guuid=fd9938c7-1b00-0000-db02-8e3fa80c0000 pid=3240 /usr/bin/rm guuid=a6d9708b-1b00-0000-db02-8e3f580c0000 pid=3160->guuid=fd9938c7-1b00-0000-db02-8e3fa80c0000 pid=3240 execve guuid=ce2bedc7-1b00-0000-db02-8e3faa0c0000 pid=3242 /usr/bin/rm guuid=a6d9708b-1b00-0000-db02-8e3f580c0000 pid=3160->guuid=ce2bedc7-1b00-0000-db02-8e3faa0c0000 pid=3242 execve 2e1ba108-bb79-560a-bab6-417767220e51 196.251.69.194:80 guuid=451fb98b-1b00-0000-db02-8e3f590c0000 pid=3161->2e1ba108-bb79-560a-bab6-417767220e51 send: 138B guuid=fe58d196-1b00-0000-db02-8e3f6b0c0000 pid=3179->2e1ba108-bb79-560a-bab6-417767220e51 send: 139B guuid=2e45589f-1b00-0000-db02-8e3f700c0000 pid=3184->2e1ba108-bb79-560a-bab6-417767220e51 send: 141B guuid=74e618a8-1b00-0000-db02-8e3f780c0000 pid=3192->2e1ba108-bb79-560a-bab6-417767220e51 send: 142B guuid=a83cefaf-1b00-0000-db02-8e3f900c0000 pid=3216->2e1ba108-bb79-560a-bab6-417767220e51 send: 138B guuid=871af0b6-1b00-0000-db02-8e3fa10c0000 pid=3233 /tmp/kitty.x86 guuid=79a4d4b6-1b00-0000-db02-8e3fa00c0000 pid=3232->guuid=871af0b6-1b00-0000-db02-8e3fa10c0000 pid=3233 clone guuid=8aaafcb6-1b00-0000-db02-8e3fa20c0000 pid=3234 /tmp/kitty.x86 delete-file net send-data zombie guuid=871af0b6-1b00-0000-db02-8e3fa10c0000 pid=3233->guuid=8aaafcb6-1b00-0000-db02-8e3fa20c0000 pid=3234 clone eb9dca7b-d301-522e-83c7-8d6f291efc38 66.78.40.221:9080 guuid=8aaafcb6-1b00-0000-db02-8e3fa20c0000 pid=3234->eb9dca7b-d301-522e-83c7-8d6f291efc38 send: 72B 74e4e219-c467-5008-a212-50a3f10516d3 114.114.115.115:53 guuid=8aaafcb6-1b00-0000-db02-8e3fa20c0000 pid=3234->74e4e219-c467-5008-a212-50a3f10516d3 send: 40B 8b0a01dc-0728-52c1-8024-c4ba7801b8d6 8.8.8.8:53 guuid=8aaafcb6-1b00-0000-db02-8e3fa20c0000 pid=3234->8b0a01dc-0728-52c1-8024-c4ba7801b8d6 send: 40B guuid=02424bb7-1b00-0000-db02-8e3fa40c0000 pid=3236->2e1ba108-bb79-560a-bab6-417767220e51 send: 141B guuid=8df82ec7-1b00-0000-db02-8e3fa70c0000 pid=3239 /tmp/kitty.x86_64 zombie guuid=bc410ac7-1b00-0000-db02-8e3fa60c0000 pid=3238->guuid=8df82ec7-1b00-0000-db02-8e3fa70c0000 pid=3239 clone guuid=3f5a3bc7-1b00-0000-db02-8e3fa90c0000 pid=3241 /tmp/kitty.x86_64 delete-file net send-data zombie guuid=8df82ec7-1b00-0000-db02-8e3fa70c0000 pid=3239->guuid=3f5a3bc7-1b00-0000-db02-8e3fa90c0000 pid=3241 clone guuid=3f5a3bc7-1b00-0000-db02-8e3fa90c0000 pid=3241->eb9dca7b-d301-522e-83c7-8d6f291efc38 send: 37B b0abba15-9a34-51cb-a2ff-3008f7e59616 208.67.222.222:53 guuid=3f5a3bc7-1b00-0000-db02-8e3fa90c0000 pid=3241->b0abba15-9a34-51cb-a2ff-3008f7e59616 send: 40B
Threat name:
Linux.Downloader.Generic
Status:
Suspicious
First seen:
2025-08-23 02:10:49 UTC
File Type:
Text (Shell)
AV detection:
7 of 24 (29.17%)
Threat level:
  3/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Modifies registry class
Suspicious use of SetWindowsHookEx
Enumerates physical storage devices
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh 0e6fbbe09430717dd44c4719ccc184a791d0d1f27f5f457fc29d8ac309f54c02

(this sample)

  
Delivery method
Distributed via web download

Comments