MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 12cb2fc108d6e276c9b142a2d5ca887a77cd6fd4e6ea4eb6d735505577ee02c5. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 7


Intelligence 7 IOCs YARA 2 File information Comments

SHA256 hash: 12cb2fc108d6e276c9b142a2d5ca887a77cd6fd4e6ea4eb6d735505577ee02c5
SHA3-384 hash: afe41eba5ec96f46ae8b73ebb8f3d3d9c253374bc7a374367e24a0c519bb7326382d010a21f577f79b5fe65be3a40540
SHA1 hash: 7fa63c04fc6a7a7843a98ba74c40e96037f2ed4e
MD5 hash: db4e1a73eebf9d074b7b970a91210f70
humanhash: louisiana-lake-william-river
File name:wget.sh
Download: download sample
Signature Mirai
File size:1'783 bytes
First seen:2026-05-02 15:43:53 UTC
Last seen:Never
File type: sh
MIME type:text/x-shellscript
ssdeep 12:q0FV3+L3Kg0FV3JL3Y9g0FV39iL3+a6g0FV3jexL3jed7/g0FV3nLL3DWg0FV3LD:v1kvDN3NM67JYVz1adFnOtzp
TLSH T11431F9C5135145F93DE6ADEBB9A58A0473A070A56CC1BE8CACD83CF9858DE1D3044E73
TrID 70.0% (.SH) Linux/UNIX shell script (7000/1)
30.0% (.) Unix-like shebang (var.3) (gen) (3000/1)
Magika shell
Reporter abuse_ch
Tags:mirai sh
URLMalware sample (SHA256 hash)SignatureTags
http://161.97.163.222/bins/jew.x8643999e54b0a43902d3b97409eeee33b6eb18586b31d4a28cb8978bc0cd6dcf40 Miraielf mirai opendir ua-wget x86
http://161.97.163.222/bins/jew.mips090106580395f02f8224c2186d322f46929d8ebdebdb86dd7bb59ab4d0cf4313 Miraielf mips mirai opendir ua-wget
http://161.97.163.222/bins/jew.mpsl06c3b54fbe5454c8db506947a902a6b9424a446650c1d13d319a4e970ab755b2 Miraielf mips mirai opendir ua-wget
http://161.97.163.222/bins/jew.arm4n/an/aua-wget
http://161.97.163.222/bins/jew.arm57755520fc3fc74c815f972a54f9e7c7ccae95c8c4cd4c1f5043a903af222e711 Miraiarm elf mirai opendir ua-wget
http://161.97.163.222/bins/jew.arm624112c8277c661c71002d06ace82e1ce89f455ad7aa5f3c19c7f4c76a804790a Miraiarm elf mirai opendir ua-wget
http://161.97.163.222/bins/jew.arm7a39b9ca61cb94cecdb77632ed54c26e69626d3569f1ff04956de52f51db2474e Miraiarm elf mirai opendir ua-wget
http://161.97.163.222/bins/jew.ppcec1f7f42a7a4634251b22b1b681a798386295a44cab22792d6ba5bc2bb3cb966 Miraielf mirai opendir PowerPC ua-wget
http://161.97.163.222/bins/jew.m68k7ddbd84d464d3924ed0fb31c638ac95d3a83c367f0d428830d4cacfe36c2e1ce Miraielf m68k mirai opendir ua-wget
http://161.97.163.222/bins/jew.sh435e068d9614a0a2d71ac4a935b45ff11d9e674c124da14e0df092d72003f0d0e Miraielf mirai opendir SuperH ua-wget

Intelligence


File Origin
# of uploads :
1
# of downloads :
41
Origin country :
DE DE
Vendor Threat Intelligence
Gathering data
Verdict:
Malicious
File Type:
unix shell
First seen:
2026-05-02T04:26:00Z UTC
Last seen:
2026-05-03T04:55:00Z UTC
Hits:
~100
Detections:
HEUR:Trojan-Downloader.Shell.Agent.p HEUR:Trojan-Downloader.Shell.Agent.gen HEUR:Trojan-Downloader.Shell.Agent.a
Threat name:
Linux.Downloader.Morila
Status:
Malicious
First seen:
2026-05-02 09:54:41 UTC
File Type:
Text (Shell)
AV detection:
22 of 36 (61.11%)
Threat level:
  3/5
Result
Malware family:
Score:
  10/10
Tags:
family:mirai botnet:kurc antivm botnet defense_evasion discovery linux
Behaviour
Reads runtime system information
System Network Configuration Discovery
Writes file to tmp directory
Changes its process name
Checks CPU configuration
Reads system network configuration
Enumerates active TCP sockets
Enumerates running processes
Writes file to system bin folder
File and Directory Permissions Modification
Executes dropped EXE
Modifies Watchdog functionality
Contacts a large (112687) amount of remote hosts
Creates a large amount of network flows
Family: Mirai
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Linux_Shellscript_Downloader
Author:albertzsigovits
Description:Generic Approach to Shellscript downloaders
Rule name:MAL_Linux_IoT_MultiArch_BotnetLoader_Generic
Author:Anish Bogati
Description:Technique-based detection of IoT/Linux botnet loader shell scripts downloading binaries from numeric IPs, chmodding, and executing multi-architecture payloads
Reference:MalwareBazaar sample lilin.sh

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh 12cb2fc108d6e276c9b142a2d5ca887a77cd6fd4e6ea4eb6d735505577ee02c5

(this sample)

Comments