MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 12ef71076e671f3c6823f1b05a4d62eefba6acc49fe48a921fc5f4b668e683cc. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 5


Intelligence 5 IOCs YARA 1 File information Comments

SHA256 hash: 12ef71076e671f3c6823f1b05a4d62eefba6acc49fe48a921fc5f4b668e683cc
SHA3-384 hash: b946203130e42d8faf38d259871ea101df3d489e5ea1352e137d443b5adaa22b7f0512d50c92fcf4e7c8e86ed93e0be8
SHA1 hash: ea8c5e2f4c75d11383515cfdf797e9ca03004479
MD5 hash: 0ae45e89c289092e1189a2c2c6019f96
humanhash: october-monkey-green-happy
File name:w.sh
Download: download sample
Signature Mirai
File size:1'072 bytes
First seen:2026-01-10 19:36:08 UTC
Last seen:Never
File type: sh
MIME type:text/plain
ssdeep 12:dUfwVUPVU1kVUDc+HVUAAAVUEAVUuOsVUAjCVUApVUE1ZVU+/pcKAVU5eTtaKAV0:nk1wj/ZDytB/vxn
TLSH T1D11190EE91F57656C46C4E0870AE95589889CBC53EA3CF88EC5C08F36A87D10F166F1B
Magika txt
Reporter abuse_ch
Tags:sh
URLMalware sample (SHA256 hash)SignatureTags
http://158.94.208.27/armv4l6c388fd0fb424d6c7eaf86abb617ff9bea68325989e3b9b7a0365e4ef6b62954 Miraielf mirai ua-wget
http://158.94.208.27/armv5lb9180c611ddf84ffbb1eedb68a12c188b684bc40867ab11e78738e417e07acaa Miraielf mirai ua-wget
http://158.94.208.27/armv6l758b1a7d6126ebf7a706f0db37fe92bddd6d8bec9cf18c7e8c68ce480f697ce6 Miraielf mirai ua-wget
http://158.94.208.27/armv7l9398f4ee9fbbd3a0545c1dad7f32828a54e63dee3d9429ede67cb9b0ea6ff304 Miraielf mirai ua-wget
http://158.94.208.27/i58637aa2c17037a3840080cf58523875ea9c690ed7151bdb93d8173ff4527d2c9f0 Miraielf mirai ua-wget
http://158.94.208.27/i686b914b60bd6ed779eeee07d42598e861352e3cbb8e2377d13920d95b9d78aef10 Miraielf mirai ua-wget
http://158.94.208.27/m68kb898eecac207321d32c8c9427b0ade7f408bab1b4db1292da972ab84a17d8b7e Miraielf mirai ua-wget
http://158.94.208.27/mips1cb169f9b7afe6d1169ea0cc5334cd86f2d9b4ad6992520d3ebebd9c5046a75f Miraielf mirai ua-wget
http://158.94.208.27/mipsel041a575f6849cb644373776a1e90252551a2a4305843b07b2b61d46007b42a13 Miraielf mirai ua-wget
http://158.94.208.27/powerpcc9758e8673f82badfaceb99df6f38b837e4b567f8e6aae5fd9c4b628540633dd Miraielf mirai ua-wget
http://158.94.208.27/powerpc-440fp021681aab424f1cb19bc0d332cd98b8816753355a91b51fb960c44ac3a78add4 Miraielf mirai ua-wget
http://158.94.208.27/sh42980a32ffc3407a8aa51b5600936f840a4041c1cb07c4f23a288e502ff91e2f9 Miraielf mirai ua-wget
http://158.94.208.27/sparc30efb0c3c09e70adc0c067a1109f8d81d9165859717f16f045fcd93dbc0ea664 Miraielf mirai ua-wget
http://158.94.208.27/x86_64b45624c3b4cf4ecc07e00097427b19dc0e0bc83e25e3afe50a5ce74e903aac76 Miraielf mirai ua-wget

Intelligence


File Origin
# of uploads :
1
# of downloads :
52
Origin country :
DE DE
Vendor Threat Intelligence
No detections
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
busybox mirai
Status:
terminated
Behavior Graph:
%3 guuid=4ba86c54-1900-0000-27dd-473835100000 pid=4149 /usr/bin/sudo guuid=f8b27856-1900-0000-27dd-473839100000 pid=4153 /tmp/sample.bin guuid=4ba86c54-1900-0000-27dd-473835100000 pid=4149->guuid=f8b27856-1900-0000-27dd-473839100000 pid=4153 execve guuid=c7082657-1900-0000-27dd-47383a100000 pid=4154 /usr/bin/busybox net send-data write-file guuid=f8b27856-1900-0000-27dd-473839100000 pid=4153->guuid=c7082657-1900-0000-27dd-47383a100000 pid=4154 execve guuid=25ec7766-1900-0000-27dd-473868100000 pid=4200 /usr/bin/chmod guuid=f8b27856-1900-0000-27dd-473839100000 pid=4153->guuid=25ec7766-1900-0000-27dd-473868100000 pid=4200 execve guuid=9420b866-1900-0000-27dd-47386c100000 pid=4204 /usr/bin/dash guuid=f8b27856-1900-0000-27dd-473839100000 pid=4153->guuid=9420b866-1900-0000-27dd-47386c100000 pid=4204 clone guuid=fe5a1c68-1900-0000-27dd-473873100000 pid=4211 /usr/bin/busybox net send-data write-file guuid=f8b27856-1900-0000-27dd-473839100000 pid=4153->guuid=fe5a1c68-1900-0000-27dd-473873100000 pid=4211 execve guuid=53c00577-1900-0000-27dd-4738aa100000 pid=4266 /usr/bin/chmod guuid=f8b27856-1900-0000-27dd-473839100000 pid=4153->guuid=53c00577-1900-0000-27dd-4738aa100000 pid=4266 execve guuid=17306977-1900-0000-27dd-4738ae100000 pid=4270 /usr/bin/dash guuid=f8b27856-1900-0000-27dd-473839100000 pid=4153->guuid=17306977-1900-0000-27dd-4738ae100000 pid=4270 clone guuid=d69d6179-1900-0000-27dd-4738b4100000 pid=4276 /usr/bin/busybox net send-data write-file guuid=f8b27856-1900-0000-27dd-473839100000 pid=4153->guuid=d69d6179-1900-0000-27dd-4738b4100000 pid=4276 execve guuid=63ef718f-1900-0000-27dd-4738f0100000 pid=4336 /usr/bin/chmod guuid=f8b27856-1900-0000-27dd-473839100000 pid=4153->guuid=63ef718f-1900-0000-27dd-4738f0100000 pid=4336 execve guuid=435ccc8f-1900-0000-27dd-4738f1100000 pid=4337 /usr/bin/dash guuid=f8b27856-1900-0000-27dd-473839100000 pid=4153->guuid=435ccc8f-1900-0000-27dd-4738f1100000 pid=4337 clone guuid=0ffbed91-1900-0000-27dd-4738f9100000 pid=4345 /usr/bin/busybox net send-data write-file guuid=f8b27856-1900-0000-27dd-473839100000 pid=4153->guuid=0ffbed91-1900-0000-27dd-4738f9100000 pid=4345 execve guuid=c9db29a1-1900-0000-27dd-473822110000 pid=4386 /usr/bin/chmod guuid=f8b27856-1900-0000-27dd-473839100000 pid=4153->guuid=c9db29a1-1900-0000-27dd-473822110000 pid=4386 execve guuid=ff3598a1-1900-0000-27dd-473826110000 pid=4390 /usr/bin/dash guuid=f8b27856-1900-0000-27dd-473839100000 pid=4153->guuid=ff3598a1-1900-0000-27dd-473826110000 pid=4390 clone guuid=500c9ea3-1900-0000-27dd-47382c110000 pid=4396 /usr/bin/busybox net send-data write-file guuid=f8b27856-1900-0000-27dd-473839100000 pid=4153->guuid=500c9ea3-1900-0000-27dd-47382c110000 pid=4396 execve guuid=f5e265b3-1900-0000-27dd-473856110000 pid=4438 /usr/bin/chmod guuid=f8b27856-1900-0000-27dd-473839100000 pid=4153->guuid=f5e265b3-1900-0000-27dd-473856110000 pid=4438 execve guuid=5fb1dcb3-1900-0000-27dd-47385a110000 pid=4442 /home/sandbox/i586 guuid=f8b27856-1900-0000-27dd-473839100000 pid=4153->guuid=5fb1dcb3-1900-0000-27dd-47385a110000 pid=4442 execve guuid=48e530b4-1900-0000-27dd-47385d110000 pid=4445 /usr/bin/busybox net send-data guuid=f8b27856-1900-0000-27dd-473839100000 pid=4153->guuid=48e530b4-1900-0000-27dd-47385d110000 pid=4445 execve guuid=b67f73be-1900-0000-27dd-473889110000 pid=4489 /usr/bin/chmod guuid=f8b27856-1900-0000-27dd-473839100000 pid=4153->guuid=b67f73be-1900-0000-27dd-473889110000 pid=4489 execve guuid=22facdbe-1900-0000-27dd-47388a110000 pid=4490 /home/sandbox/i686 guuid=f8b27856-1900-0000-27dd-473839100000 pid=4153->guuid=22facdbe-1900-0000-27dd-47388a110000 pid=4490 execve guuid=262a8ac0-1900-0000-27dd-47388f110000 pid=4495 /usr/bin/busybox net send-data write-file guuid=f8b27856-1900-0000-27dd-473839100000 pid=4153->guuid=262a8ac0-1900-0000-27dd-47388f110000 pid=4495 execve guuid=b96e9dcf-1900-0000-27dd-4738a9110000 pid=4521 /usr/bin/chmod guuid=f8b27856-1900-0000-27dd-473839100000 pid=4153->guuid=b96e9dcf-1900-0000-27dd-4738a9110000 pid=4521 execve guuid=fbcd20d0-1900-0000-27dd-4738aa110000 pid=4522 /usr/bin/dash guuid=f8b27856-1900-0000-27dd-473839100000 pid=4153->guuid=fbcd20d0-1900-0000-27dd-4738aa110000 pid=4522 clone guuid=548b09d1-1900-0000-27dd-4738ae110000 pid=4526 /usr/bin/busybox net send-data write-file guuid=f8b27856-1900-0000-27dd-473839100000 pid=4153->guuid=548b09d1-1900-0000-27dd-4738ae110000 pid=4526 execve guuid=6169efdf-1900-0000-27dd-4738d6110000 pid=4566 /usr/bin/chmod guuid=f8b27856-1900-0000-27dd-473839100000 pid=4153->guuid=6169efdf-1900-0000-27dd-4738d6110000 pid=4566 execve guuid=9f426ce0-1900-0000-27dd-4738d8110000 pid=4568 /usr/bin/dash guuid=f8b27856-1900-0000-27dd-473839100000 pid=4153->guuid=9f426ce0-1900-0000-27dd-4738d8110000 pid=4568 clone guuid=050779e1-1900-0000-27dd-4738de110000 pid=4574 /usr/bin/busybox net send-data write-file guuid=f8b27856-1900-0000-27dd-473839100000 pid=4153->guuid=050779e1-1900-0000-27dd-4738de110000 pid=4574 execve guuid=a67e68f1-1900-0000-27dd-47381d120000 pid=4637 /usr/bin/chmod guuid=f8b27856-1900-0000-27dd-473839100000 pid=4153->guuid=a67e68f1-1900-0000-27dd-47381d120000 pid=4637 execve guuid=fdccb4f1-1900-0000-27dd-47381f120000 pid=4639 /usr/bin/dash guuid=f8b27856-1900-0000-27dd-473839100000 pid=4153->guuid=fdccb4f1-1900-0000-27dd-47381f120000 pid=4639 clone guuid=354b89f2-1900-0000-27dd-473823120000 pid=4643 /usr/bin/busybox net send-data write-file guuid=f8b27856-1900-0000-27dd-473839100000 pid=4153->guuid=354b89f2-1900-0000-27dd-473823120000 pid=4643 execve guuid=5907ac01-1a00-0000-27dd-473854120000 pid=4692 /usr/bin/chmod guuid=f8b27856-1900-0000-27dd-473839100000 pid=4153->guuid=5907ac01-1a00-0000-27dd-473854120000 pid=4692 execve guuid=a524ef01-1a00-0000-27dd-473856120000 pid=4694 /usr/bin/dash guuid=f8b27856-1900-0000-27dd-473839100000 pid=4153->guuid=a524ef01-1a00-0000-27dd-473856120000 pid=4694 clone guuid=397b5c03-1a00-0000-27dd-47385a120000 pid=4698 /usr/bin/busybox net send-data write-file guuid=f8b27856-1900-0000-27dd-473839100000 pid=4153->guuid=397b5c03-1a00-0000-27dd-47385a120000 pid=4698 execve guuid=7c361013-1a00-0000-27dd-473864120000 pid=4708 /usr/bin/chmod guuid=f8b27856-1900-0000-27dd-473839100000 pid=4153->guuid=7c361013-1a00-0000-27dd-473864120000 pid=4708 execve guuid=4da88713-1a00-0000-27dd-473865120000 pid=4709 /usr/bin/dash guuid=f8b27856-1900-0000-27dd-473839100000 pid=4153->guuid=4da88713-1a00-0000-27dd-473865120000 pid=4709 clone guuid=d3db3516-1a00-0000-27dd-47386e120000 pid=4718 /usr/bin/busybox net send-data write-file guuid=f8b27856-1900-0000-27dd-473839100000 pid=4153->guuid=d3db3516-1a00-0000-27dd-47386e120000 pid=4718 execve guuid=1e1c2e26-1a00-0000-27dd-47389d120000 pid=4765 /usr/bin/chmod guuid=f8b27856-1900-0000-27dd-473839100000 pid=4153->guuid=1e1c2e26-1a00-0000-27dd-47389d120000 pid=4765 execve guuid=64966326-1a00-0000-27dd-47389e120000 pid=4766 /usr/bin/dash guuid=f8b27856-1900-0000-27dd-473839100000 pid=4153->guuid=64966326-1a00-0000-27dd-47389e120000 pid=4766 clone guuid=87e2a727-1a00-0000-27dd-4738a5120000 pid=4773 /usr/bin/busybox net send-data write-file guuid=f8b27856-1900-0000-27dd-473839100000 pid=4153->guuid=87e2a727-1a00-0000-27dd-4738a5120000 pid=4773 execve guuid=a5eb4537-1a00-0000-27dd-4738c6120000 pid=4806 /usr/bin/chmod guuid=f8b27856-1900-0000-27dd-473839100000 pid=4153->guuid=a5eb4537-1a00-0000-27dd-4738c6120000 pid=4806 execve guuid=cdb9a337-1a00-0000-27dd-4738c8120000 pid=4808 /usr/bin/dash guuid=f8b27856-1900-0000-27dd-473839100000 pid=4153->guuid=cdb9a337-1a00-0000-27dd-4738c8120000 pid=4808 clone guuid=07834039-1a00-0000-27dd-4738ce120000 pid=4814 /usr/bin/busybox net send-data write-file guuid=f8b27856-1900-0000-27dd-473839100000 pid=4153->guuid=07834039-1a00-0000-27dd-4738ce120000 pid=4814 execve guuid=324b6c48-1a00-0000-27dd-4738ef120000 pid=4847 /usr/bin/chmod guuid=f8b27856-1900-0000-27dd-473839100000 pid=4153->guuid=324b6c48-1a00-0000-27dd-4738ef120000 pid=4847 execve guuid=c78dd048-1a00-0000-27dd-4738f1120000 pid=4849 /home/sandbox/x86_64 guuid=f8b27856-1900-0000-27dd-473839100000 pid=4153->guuid=c78dd048-1a00-0000-27dd-4738f1120000 pid=4849 execve guuid=e5310449-1a00-0000-27dd-4738f3120000 pid=4851 /usr/bin/rm delete-file guuid=f8b27856-1900-0000-27dd-473839100000 pid=4153->guuid=e5310449-1a00-0000-27dd-4738f3120000 pid=4851 execve b8c32f6f-e0ff-5b69-a443-652e84386a76 158.94.208.27:80 guuid=c7082657-1900-0000-27dd-47383a100000 pid=4154->b8c32f6f-e0ff-5b69-a443-652e84386a76 send: 82B guuid=fe5a1c68-1900-0000-27dd-473873100000 pid=4211->b8c32f6f-e0ff-5b69-a443-652e84386a76 send: 82B guuid=d69d6179-1900-0000-27dd-4738b4100000 pid=4276->b8c32f6f-e0ff-5b69-a443-652e84386a76 send: 82B guuid=0ffbed91-1900-0000-27dd-4738f9100000 pid=4345->b8c32f6f-e0ff-5b69-a443-652e84386a76 send: 82B guuid=500c9ea3-1900-0000-27dd-47382c110000 pid=4396->b8c32f6f-e0ff-5b69-a443-652e84386a76 send: 80B guuid=82b721b4-1900-0000-27dd-47385c110000 pid=4444 /home/sandbox/i586 net send-data zombie guuid=5fb1dcb3-1900-0000-27dd-47385a110000 pid=4442->guuid=82b721b4-1900-0000-27dd-47385c110000 pid=4444 clone 8ee75894-53f4-5971-bfe4-14833083502f 84.234.96.159:12344 guuid=82b721b4-1900-0000-27dd-47385c110000 pid=4444->8ee75894-53f4-5971-bfe4-14833083502f send: 456B guuid=78fe35b4-1900-0000-27dd-47385e110000 pid=4446 /home/sandbox/i586 guuid=82b721b4-1900-0000-27dd-47385c110000 pid=4444->guuid=78fe35b4-1900-0000-27dd-47385e110000 pid=4446 clone guuid=48e530b4-1900-0000-27dd-47385d110000 pid=4445->b8c32f6f-e0ff-5b69-a443-652e84386a76 send: 80B guuid=262a8ac0-1900-0000-27dd-47388f110000 pid=4495->b8c32f6f-e0ff-5b69-a443-652e84386a76 send: 80B guuid=548b09d1-1900-0000-27dd-4738ae110000 pid=4526->b8c32f6f-e0ff-5b69-a443-652e84386a76 send: 80B guuid=050779e1-1900-0000-27dd-4738de110000 pid=4574->b8c32f6f-e0ff-5b69-a443-652e84386a76 send: 82B guuid=354b89f2-1900-0000-27dd-473823120000 pid=4643->b8c32f6f-e0ff-5b69-a443-652e84386a76 send: 83B guuid=397b5c03-1a00-0000-27dd-47385a120000 pid=4698->b8c32f6f-e0ff-5b69-a443-652e84386a76 send: 89B guuid=d3db3516-1a00-0000-27dd-47386e120000 pid=4718->b8c32f6f-e0ff-5b69-a443-652e84386a76 send: 79B guuid=87e2a727-1a00-0000-27dd-4738a5120000 pid=4773->b8c32f6f-e0ff-5b69-a443-652e84386a76 send: 81B guuid=07834039-1a00-0000-27dd-4738ce120000 pid=4814->b8c32f6f-e0ff-5b69-a443-652e84386a76 send: 82B guuid=0973ef48-1a00-0000-27dd-4738f2120000 pid=4850 /home/sandbox/x86_64 net send-data zombie guuid=c78dd048-1a00-0000-27dd-4738f1120000 pid=4849->guuid=0973ef48-1a00-0000-27dd-4738f2120000 pid=4850 clone guuid=0973ef48-1a00-0000-27dd-4738f2120000 pid=4850->8ee75894-53f4-5971-bfe4-14833083502f send: 619B guuid=cba70449-1a00-0000-27dd-4738f4120000 pid=4852 /home/sandbox/x86_64 guuid=0973ef48-1a00-0000-27dd-4738f2120000 pid=4850->guuid=cba70449-1a00-0000-27dd-4738f4120000 pid=4852 clone
Threat name:
Document-HTML.Worm.Mirai
Status:
Malicious
First seen:
2026-01-10 19:24:06 UTC
File Type:
Text (Shell)
AV detection:
18 of 38 (47.37%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Modifies registry class
Suspicious use of SetWindowsHookEx
Enumerates physical storage devices
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:MAL_Linux_IoT_MultiArch_BotnetLoader_Generic
Author:Anish Bogati
Description:Technique-based detection of IoT/Linux botnet loader shell scripts downloading binaries from numeric IPs, chmodding, and executing multi-architecture payloads
Reference:MalwareBazaar sample lilin.sh

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh 12ef71076e671f3c6823f1b05a4d62eefba6acc49fe48a921fc5f4b668e683cc

(this sample)

  
Delivery method
Distributed via web download

Comments