MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 1131d86bc6bcc636270e7adf5d082b46713b8685dea05e9377eaee0189dcfef9. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: 1131d86bc6bcc636270e7adf5d082b46713b8685dea05e9377eaee0189dcfef9
SHA3-384 hash: f8b6a12458137356db48f1a5356c82166efd659c0a3bf751cdc488dd9e53dff4c19cfd425eaf759efb903525d6f01a2b
SHA1 hash: d5d5af9e81c303bbc9c4d90b8a3f59afcd0fd1b4
MD5 hash: 717f798b1a2550c73791cf33c7b0b569
humanhash: bluebird-purple-wyoming-cardinal
File name:r.sh
Download: download sample
Signature Mirai
File size:337 bytes
First seen:2026-01-11 13:00:20 UTC
Last seen:Never
File type: sh
MIME type:text/plain
ssdeep 6:LMFALaglLMFALUFflLMFALJPlLMFALCigo:oALagiALeiALJPiALCigo
TLSH T1FEE01ACE044220A4C0085B80FA23AC20B899D482F9394F2C3CCB08B4848C698A139E89
Magika shell
Reporter abuse_ch
Tags:sh
URLMalware sample (SHA256 hash)SignatureTags
http://185.236.25.149/karm7c07d9777f8a51b3dc42574d5a41239487145b5915d546632d729abf5d031d06f Miraielf ua-wget
http://185.236.25.149/karm6d3eadc4c3053018ea86ac29c1551cfb90876a88eec6deb1a9010dcf37334f454 Miraielf ua-wget
http://185.236.25.149/karm5fa470895a4c43de2769b080bfcf17893f0c9f4f29835cc20b3358603a7c9b617 Miraielf ua-wget
http://185.236.25.149/karm5d626d8aed58dd902a058f92c6ab37f137074dd73d90c6bf0153fe1a1fcc8e4c Miraielf ua-wget

Intelligence


File Origin
# of uploads :
1
# of downloads :
62
Origin country :
DE DE
Vendor Threat Intelligence
No detections
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
evasive mirai
Verdict:
Malicious
File Type:
text
First seen:
2026-01-11T10:17:00Z UTC
Last seen:
2026-01-11T10:23:00Z UTC
Hits:
~10
Detections:
HEUR:Trojan-Downloader.Shell.Agent.a
Status:
terminated
Behavior Graph:
%3 guuid=b283f822-1800-0000-6506-7875b90c0000 pid=3257 /usr/bin/sudo guuid=9477d024-1800-0000-6506-7875c00c0000 pid=3264 /tmp/sample.bin guuid=b283f822-1800-0000-6506-7875b90c0000 pid=3257->guuid=9477d024-1800-0000-6506-7875c00c0000 pid=3264 execve guuid=0a7d0f25-1800-0000-6506-7875c20c0000 pid=3266 /usr/bin/wget net send-data write-file guuid=9477d024-1800-0000-6506-7875c00c0000 pid=3264->guuid=0a7d0f25-1800-0000-6506-7875c20c0000 pid=3266 execve guuid=cf15e781-1800-0000-6506-7875960d0000 pid=3478 /usr/bin/chmod guuid=9477d024-1800-0000-6506-7875c00c0000 pid=3264->guuid=cf15e781-1800-0000-6506-7875960d0000 pid=3478 execve guuid=01be2b82-1800-0000-6506-7875980d0000 pid=3480 /usr/bin/dash guuid=9477d024-1800-0000-6506-7875c00c0000 pid=3264->guuid=01be2b82-1800-0000-6506-7875980d0000 pid=3480 clone guuid=baa2cc82-1800-0000-6506-78759c0d0000 pid=3484 /usr/bin/wget net send-data write-file guuid=9477d024-1800-0000-6506-7875c00c0000 pid=3264->guuid=baa2cc82-1800-0000-6506-78759c0d0000 pid=3484 execve guuid=81d20a8f-1800-0000-6506-7875b10d0000 pid=3505 /usr/bin/chmod guuid=9477d024-1800-0000-6506-7875c00c0000 pid=3264->guuid=81d20a8f-1800-0000-6506-7875b10d0000 pid=3505 execve guuid=09356b8f-1800-0000-6506-7875b20d0000 pid=3506 /usr/bin/dash guuid=9477d024-1800-0000-6506-7875c00c0000 pid=3264->guuid=09356b8f-1800-0000-6506-7875b20d0000 pid=3506 clone guuid=35c46e96-1800-0000-6506-7875b40d0000 pid=3508 /usr/bin/wget net send-data write-file guuid=9477d024-1800-0000-6506-7875c00c0000 pid=3264->guuid=35c46e96-1800-0000-6506-7875b40d0000 pid=3508 execve guuid=f7a5d3a6-1900-0000-6506-78750b100000 pid=4107 /usr/bin/chmod guuid=9477d024-1800-0000-6506-7875c00c0000 pid=3264->guuid=f7a5d3a6-1900-0000-6506-78750b100000 pid=4107 execve guuid=375b3aa7-1900-0000-6506-78750d100000 pid=4109 /usr/bin/dash guuid=9477d024-1800-0000-6506-7875c00c0000 pid=3264->guuid=375b3aa7-1900-0000-6506-78750d100000 pid=4109 clone guuid=2866feac-1900-0000-6506-78751e100000 pid=4126 /usr/bin/wget net send-data write-file guuid=9477d024-1800-0000-6506-7875c00c0000 pid=3264->guuid=2866feac-1900-0000-6506-78751e100000 pid=4126 execve guuid=12a247d8-1900-0000-6506-78758e100000 pid=4238 /usr/bin/chmod guuid=9477d024-1800-0000-6506-7875c00c0000 pid=3264->guuid=12a247d8-1900-0000-6506-78758e100000 pid=4238 execve guuid=6c15e1d8-1900-0000-6506-787590100000 pid=4240 /usr/bin/dash guuid=9477d024-1800-0000-6506-7875c00c0000 pid=3264->guuid=6c15e1d8-1900-0000-6506-787590100000 pid=4240 clone c8fc5022-3c4f-5c65-9924-039a2fd9a4ae 185.236.25.149:80 guuid=0a7d0f25-1800-0000-6506-7875c20c0000 pid=3266->c8fc5022-3c4f-5c65-9924-039a2fd9a4ae send: 134B guuid=baa2cc82-1800-0000-6506-78759c0d0000 pid=3484->c8fc5022-3c4f-5c65-9924-039a2fd9a4ae send: 134B guuid=35c46e96-1800-0000-6506-7875b40d0000 pid=3508->c8fc5022-3c4f-5c65-9924-039a2fd9a4ae send: 134B guuid=2866feac-1900-0000-6506-78751e100000 pid=4126->c8fc5022-3c4f-5c65-9924-039a2fd9a4ae send: 133B
Verdict:
Malicious
Threat:
Trojan-Downloader.Shell.Agent
Threat name:
Document-HTML.Trojan.Heuristic
Status:
Malicious
First seen:
2026-01-11 13:00:54 UTC
File Type:
Text (Shell)
AV detection:
9 of 24 (37.50%)
Threat level:
  2/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Modifies registry class
Suspicious use of SetWindowsHookEx
Enumerates physical storage devices
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh 1131d86bc6bcc636270e7adf5d082b46713b8685dea05e9377eaee0189dcfef9

(this sample)

  
Delivery method
Distributed via web download

Comments