MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 0ed758aeeb5596c9db5be5a67b608960461376cf0209cb60629e2ae7bc282419. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Mirai
Vendor detections: 7
| SHA256 hash: | 0ed758aeeb5596c9db5be5a67b608960461376cf0209cb60629e2ae7bc282419 |
|---|---|
| SHA3-384 hash: | 34eaffe2200d9aec92a60e9d1d370a993c1f7f03552fdc826e586ce989b352bdbdb08227459810d115960b49cd9f013a |
| SHA1 hash: | bfa1494a468af9e86915761340cedb9ad918e02c |
| MD5 hash: | 5b944542e94f97078a7b20126b85e52d |
| humanhash: | solar-delaware-four-neptune |
| File name: | run.sh |
| Download: | download sample |
| Signature | Mirai |
| File size: | 7'578 bytes |
| First seen: | 2025-09-07 15:01:25 UTC |
| Last seen: | Never |
| File type: | sh |
| MIME type: | text/x-shellscript |
| ssdeep | 192:F8HTKpZzzDN19xDkIam3qadayHDPMTMvlgYm:JzvLzaUbjm+gR |
| TLSH | T1E1F1C806F6D09AB42988C568844A1840754F952B5D092C08F8FDB56DFF3876CB1FDBEB |
| Magika | shell |
| Reporter | |
| Tags: | mirai sh |
Shell script dropper
This file seems to be a shell script dropper, using wget, ftpget and/or curl. More information about the corresponding payload URLs are shown below.
| URL | Malware sample (SHA256 hash) | Signature | Tags |
|---|---|---|---|
| http://162.248.53.119:8000/yes.tar.gz | n/a | n/a | opendir |
| http://162.248.53.119:8000/mon.sh | 1e891ab1521b27923233e694f60fdbf0e1b840e657d8b1ffdefd8b5ef5e38964 | CoinMiner | CoinMiner |
| https://github.com/el3ctr0wqw1/xmrig-vrl2/releases/download/main/xmrig-vrl | n/a | n/a | n/a |
Intelligence
File Origin
# of uploads :
1
# of downloads :
31
Origin country :
DEVendor Threat Intelligence
Detection(s):
Verdict:
Malicious
File Type:
unix shell
First seen:
2025-09-07T12:10:00Z UTC
Last seen:
2025-09-07T12:10:00Z UTC
Hits:
~10
Detections:
HEUR:Trojan-Downloader.Shell.Agent.bc
Status:
terminated
Behavior Graph:
Score:
2%
Verdict:
Benign
File Type:
SCRIPT
Verdict:
Malicious
Threat:
Family.XMRIG
Threat name:
Win32.Trojan.Generic
Status:
Suspicious
First seen:
2025-09-07 15:02:34 UTC
File Type:
Text (Shell)
AV detection:
9 of 38 (23.68%)
Threat level:
5/5
Detection(s):
Suspicious file
Result
Malware family:
xmrig_linux
Score:
10/10
Tags:
family:xmrig family:xmrig_linux antivm defense_evasion discovery execution linux miner persistence privilege_escalation
Behaviour
Enumerates kernel/hardware configuration
Reads runtime system information
System Network Configuration Discovery
Writes file to tmp directory
Changes its process name
Checks CPU configuration
Reads CPU attributes
Checks hardware identifiers (DMI)
Creates/modifies Cron job
Enumerates running processes
Reads hardware information
File and Directory Permissions Modification
Executes dropped EXE
XMRig Miner payload
Xmrig family
Xmrig_linux family
xmrig
Malware family:
XMRig
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Legit
Score:
0.06
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
4537e474274cf7e7e1920f0ba0ccd7fc219b2698a5af85689649ceb7962953ce
Delivery method
Distributed via web download
Dropping
MD5 0782916ee8c331309e8fd467529ed93d
Dropping
SHA256 4537e474274cf7e7e1920f0ba0ccd7fc219b2698a5af85689649ceb7962953ce
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.