MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 1277a52689c6d0fff47c5d773fccb4a6628f55f8761544bbf515e2faf7fd59f2. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: 1277a52689c6d0fff47c5d773fccb4a6628f55f8761544bbf515e2faf7fd59f2
SHA3-384 hash: c5255aaf2cd9c5a4f19ce0abc2ebea986071561ee152023cbe79f068716439454a734f9534d4374180004038d312b380
SHA1 hash: 161a8738d5761c3d4f39c9101334f840a330c001
MD5 hash: 2cd0b68fbb01dddf3af34f10aa48d20a
humanhash: massachusetts-fifteen-tennis-happy
File name:run.sh
Download: download sample
Signature Mirai
File size:2'142 bytes
First seen:2026-01-13 13:01:10 UTC
Last seen:Never
File type: sh
MIME type:text/x-shellscript
ssdeep 48:JN5+uxZkxdz5rih8uyR/Elo5mdsAEq/U//k6C40eLeYxejd0SWBAZXT5ZR:r5+u7k7z5rih8NRslMYsAEq8/MPT5ZR
TLSH T10C416E91A803A0F6695813359DA7B377B0003B9B2677E6CE714C30E07FDC31594AADA1
TrID 70.0% (.SH) Linux/UNIX shell script (7000/1)
30.0% (.) Unix-like shebang (var.3) (gen) (3000/1)
Magika shell
Reporter abuse_ch
Tags:mirai sh
URLMalware sample (SHA256 hash)SignatureTags
http://61.7.209.88/n/an/an/a

Intelligence


File Origin
# of uploads :
1
# of downloads :
51
Origin country :
DE DE
Vendor Threat Intelligence
No detections
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
busybox
Result
Gathering data
Verdict:
Malicious
File Type:
unix shell
Detections:
HEUR:Trojan-Downloader.Shell.Agent.p
Status:
terminated
Behavior Graph:
%3 guuid=661dea4c-1800-0000-1bb3-cef3d90c0000 pid=3289 /usr/bin/sudo guuid=b188b14e-1800-0000-1bb3-cef3e10c0000 pid=3297 /tmp/sample.bin guuid=661dea4c-1800-0000-1bb3-cef3d90c0000 pid=3289->guuid=b188b14e-1800-0000-1bb3-cef3e10c0000 pid=3297 execve guuid=93ede64e-1800-0000-1bb3-cef3e20c0000 pid=3298 /usr/bin/uname guuid=b188b14e-1800-0000-1bb3-cef3e10c0000 pid=3297->guuid=93ede64e-1800-0000-1bb3-cef3e20c0000 pid=3298 execve guuid=121d254f-1800-0000-1bb3-cef3e40c0000 pid=3300 /usr/bin/wget net send-data write-file guuid=b188b14e-1800-0000-1bb3-cef3e10c0000 pid=3297->guuid=121d254f-1800-0000-1bb3-cef3e40c0000 pid=3300 execve guuid=43a88282-1800-0000-1bb3-cef3520d0000 pid=3410 /usr/bin/chmod guuid=b188b14e-1800-0000-1bb3-cef3e10c0000 pid=3297->guuid=43a88282-1800-0000-1bb3-cef3520d0000 pid=3410 execve guuid=57fbce82-1800-0000-1bb3-cef3540d0000 pid=3412 /usr/bin/dash zombie guuid=b188b14e-1800-0000-1bb3-cef3e10c0000 pid=3297->guuid=57fbce82-1800-0000-1bb3-cef3540d0000 pid=3412 clone guuid=0136d582-1800-0000-1bb3-cef3550d0000 pid=3413 /usr/bin/rm delete-file guuid=b188b14e-1800-0000-1bb3-cef3e10c0000 pid=3297->guuid=0136d582-1800-0000-1bb3-cef3550d0000 pid=3413 execve d9afe332-3d3b-5c83-ae25-a7c09523c8b8 61.7.209.88:80 guuid=121d254f-1800-0000-1bb3-cef3e40c0000 pid=3300->d9afe332-3d3b-5c83-ae25-a7c09523c8b8 send: 151B
Gathering data
Result
Malware family:
Score:
  10/10
Tags:
family:mirai botnet:lzrd botnet defense_evasion discovery linux upx
Behaviour
Reads runtime system information
System Network Configuration Discovery
Writes file to tmp directory
Changes its process name
UPX packed file
Writes file to system bin folder
File and Directory Permissions Modification
Executes dropped EXE
Modifies Watchdog functionality
Mirai
Mirai family
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh 1277a52689c6d0fff47c5d773fccb4a6628f55f8761544bbf515e2faf7fd59f2

(this sample)

  
Delivery method
Distributed via web download

Comments