MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 13bcc2e6defd3b38a63800870cc248ce349798244f36698db955501b91cbf86a. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: 13bcc2e6defd3b38a63800870cc248ce349798244f36698db955501b91cbf86a
SHA3-384 hash: 490ae74d3605d2338ba21b95faec046fd57e0171c27da6a2d323c85139b320dc7e0851c16dc10bd8bd5de29f4cc6786b
SHA1 hash: 00b7bb9349235d0c5cb406b973aa23042f1bf9d8
MD5 hash: 0a894bfa5e7ea6b9eafa605b0499abb7
humanhash: papa-fruit-mango-kansas
File name:router.zyxel.sh
Download: download sample
Signature Mirai
File size:695 bytes
First seen:2025-08-23 19:39:39 UTC
Last seen:Never
File type: sh
MIME type:text/plain
ssdeep 12:7ppRo6RpRrWzUf6KZpRrTmz6KYhpReaOEd6EpR46Y0pRtVd6n:T1vk0xzfAHb+lYO2n
TLSH T19C018B9F585C7211F4F8DB02781387185F09929BECD01F90A75CB872C78DC14F615A42
Magika txt
Reporter abuse_ch
Tags:mirai sh
URLMalware sample (SHA256 hash)SignatureTags
http://196.251.84.253/kitty.arm824235df77016d1aad750a9f52919f521f7354f124a9d710d4a3c98d4b64615f Ngiowebelf mirai Ngioweb ua-wget
http://196.251.84.253/kitty.mipsn/an/aelf mirai ua-wget
http://196.251.84.253/kitty.mipselcb93ba4bdeca9b98b820e6a54f5ce7259c6dea673d8ee2b92e88d39f70efb8ea Miraielf mirai ua-wget
http://196.251.84.253/kitty.aarch641a930b4aa7c5f6e140466a8309037bf5def5614f7ed514bd9010868b8f51710b Tsunamielf mirai Tsunami ua-wget
http://196.251.84.253/kitty.x86f9f93bed6018700b5d961c16acd4bff913c697831df29fa1d91dafcdd50686ec Miraielf mirai ua-wget
http://196.251.84.253/kitty.x86_64n/an/aelf mirai ua-wget

Intelligence


File Origin
# of uploads :
1
# of downloads :
32
Origin country :
DE DE
Vendor Threat Intelligence
Verdict:
Malicious
File Type:
text
Detections:
HEUR:Trojan-Downloader.Shell.Agent.p HEUR:Trojan-Downloader.Shell.Agent.a
Status:
terminated
Behavior Graph:
%3 guuid=97c8efa7-2000-0000-696e-6a30b90a0000 pid=2745 /usr/bin/sudo guuid=4718cca9-2000-0000-696e-6a30bf0a0000 pid=2751 /tmp/sample.bin guuid=97c8efa7-2000-0000-696e-6a30b90a0000 pid=2745->guuid=4718cca9-2000-0000-696e-6a30bf0a0000 pid=2751 execve guuid=37ef20aa-2000-0000-696e-6a30c00a0000 pid=2752 /usr/bin/wget net send-data write-file guuid=4718cca9-2000-0000-696e-6a30bf0a0000 pid=2751->guuid=37ef20aa-2000-0000-696e-6a30c00a0000 pid=2752 execve guuid=04bb49b0-2000-0000-696e-6a30c70a0000 pid=2759 /usr/bin/chmod guuid=4718cca9-2000-0000-696e-6a30bf0a0000 pid=2751->guuid=04bb49b0-2000-0000-696e-6a30c70a0000 pid=2759 execve guuid=ff9ba2b0-2000-0000-696e-6a30c80a0000 pid=2760 /usr/bin/dash guuid=4718cca9-2000-0000-696e-6a30bf0a0000 pid=2751->guuid=ff9ba2b0-2000-0000-696e-6a30c80a0000 pid=2760 clone guuid=ae4d40b1-2000-0000-696e-6a30cb0a0000 pid=2763 /usr/bin/rm delete-file guuid=4718cca9-2000-0000-696e-6a30bf0a0000 pid=2751->guuid=ae4d40b1-2000-0000-696e-6a30cb0a0000 pid=2763 execve guuid=4407a0b1-2000-0000-696e-6a30cc0a0000 pid=2764 /usr/bin/wget net send-data write-file guuid=4718cca9-2000-0000-696e-6a30bf0a0000 pid=2751->guuid=4407a0b1-2000-0000-696e-6a30cc0a0000 pid=2764 execve guuid=2a9794b6-2000-0000-696e-6a30d40a0000 pid=2772 /usr/bin/chmod guuid=4718cca9-2000-0000-696e-6a30bf0a0000 pid=2751->guuid=2a9794b6-2000-0000-696e-6a30d40a0000 pid=2772 execve guuid=c676cfb6-2000-0000-696e-6a30d50a0000 pid=2773 /usr/bin/dash guuid=4718cca9-2000-0000-696e-6a30bf0a0000 pid=2751->guuid=c676cfb6-2000-0000-696e-6a30d50a0000 pid=2773 clone guuid=c0af50b7-2000-0000-696e-6a30d80a0000 pid=2776 /usr/bin/rm delete-file guuid=4718cca9-2000-0000-696e-6a30bf0a0000 pid=2751->guuid=c0af50b7-2000-0000-696e-6a30d80a0000 pid=2776 execve guuid=00a6ceb7-2000-0000-696e-6a30da0a0000 pid=2778 /usr/bin/wget net send-data write-file guuid=4718cca9-2000-0000-696e-6a30bf0a0000 pid=2751->guuid=00a6ceb7-2000-0000-696e-6a30da0a0000 pid=2778 execve guuid=d83bf3bc-2000-0000-696e-6a30e60a0000 pid=2790 /usr/bin/chmod guuid=4718cca9-2000-0000-696e-6a30bf0a0000 pid=2751->guuid=d83bf3bc-2000-0000-696e-6a30e60a0000 pid=2790 execve guuid=58c230bd-2000-0000-696e-6a30e70a0000 pid=2791 /usr/bin/dash guuid=4718cca9-2000-0000-696e-6a30bf0a0000 pid=2751->guuid=58c230bd-2000-0000-696e-6a30e70a0000 pid=2791 clone guuid=d115a8be-2000-0000-696e-6a30ea0a0000 pid=2794 /usr/bin/rm delete-file guuid=4718cca9-2000-0000-696e-6a30bf0a0000 pid=2751->guuid=d115a8be-2000-0000-696e-6a30ea0a0000 pid=2794 execve guuid=2ff7f3be-2000-0000-696e-6a30eb0a0000 pid=2795 /usr/bin/wget net send-data write-file guuid=4718cca9-2000-0000-696e-6a30bf0a0000 pid=2751->guuid=2ff7f3be-2000-0000-696e-6a30eb0a0000 pid=2795 execve guuid=eaecf5c3-2000-0000-696e-6a30f80a0000 pid=2808 /usr/bin/chmod guuid=4718cca9-2000-0000-696e-6a30bf0a0000 pid=2751->guuid=eaecf5c3-2000-0000-696e-6a30f80a0000 pid=2808 execve guuid=67d340c4-2000-0000-696e-6a30fa0a0000 pid=2810 /usr/bin/dash guuid=4718cca9-2000-0000-696e-6a30bf0a0000 pid=2751->guuid=67d340c4-2000-0000-696e-6a30fa0a0000 pid=2810 clone guuid=4390edc4-2000-0000-696e-6a30fd0a0000 pid=2813 /usr/bin/rm delete-file guuid=4718cca9-2000-0000-696e-6a30bf0a0000 pid=2751->guuid=4390edc4-2000-0000-696e-6a30fd0a0000 pid=2813 execve guuid=a40945c5-2000-0000-696e-6a30ff0a0000 pid=2815 /usr/bin/wget net send-data write-file guuid=4718cca9-2000-0000-696e-6a30bf0a0000 pid=2751->guuid=a40945c5-2000-0000-696e-6a30ff0a0000 pid=2815 execve guuid=a2d3eac9-2000-0000-696e-6a30020b0000 pid=2818 /usr/bin/chmod guuid=4718cca9-2000-0000-696e-6a30bf0a0000 pid=2751->guuid=a2d3eac9-2000-0000-696e-6a30020b0000 pid=2818 execve guuid=752b7aca-2000-0000-696e-6a30040b0000 pid=2820 /tmp/kitty.x86 delete-file guuid=4718cca9-2000-0000-696e-6a30bf0a0000 pid=2751->guuid=752b7aca-2000-0000-696e-6a30040b0000 pid=2820 execve guuid=01cfa0ca-2000-0000-696e-6a30060b0000 pid=2822 /usr/bin/rm guuid=4718cca9-2000-0000-696e-6a30bf0a0000 pid=2751->guuid=01cfa0ca-2000-0000-696e-6a30060b0000 pid=2822 execve guuid=83f3deca-2000-0000-696e-6a30070b0000 pid=2823 /usr/bin/wget net send-data write-file guuid=4718cca9-2000-0000-696e-6a30bf0a0000 pid=2751->guuid=83f3deca-2000-0000-696e-6a30070b0000 pid=2823 execve guuid=00acc8cf-2000-0000-696e-6a300f0b0000 pid=2831 /usr/bin/chmod guuid=4718cca9-2000-0000-696e-6a30bf0a0000 pid=2751->guuid=00acc8cf-2000-0000-696e-6a300f0b0000 pid=2831 execve guuid=c37a11d0-2000-0000-696e-6a30100b0000 pid=2832 /tmp/kitty.x86_64 delete-file guuid=4718cca9-2000-0000-696e-6a30bf0a0000 pid=2751->guuid=c37a11d0-2000-0000-696e-6a30100b0000 pid=2832 execve guuid=01e330d0-2000-0000-696e-6a30120b0000 pid=2834 /usr/bin/rm guuid=4718cca9-2000-0000-696e-6a30bf0a0000 pid=2751->guuid=01e330d0-2000-0000-696e-6a30120b0000 pid=2834 execve c36a0b40-e761-5342-9869-7d0f3e9f67ae 196.251.84.253:80 guuid=37ef20aa-2000-0000-696e-6a30c00a0000 pid=2752->c36a0b40-e761-5342-9869-7d0f3e9f67ae send: 138B guuid=4407a0b1-2000-0000-696e-6a30cc0a0000 pid=2764->c36a0b40-e761-5342-9869-7d0f3e9f67ae send: 139B guuid=00a6ceb7-2000-0000-696e-6a30da0a0000 pid=2778->c36a0b40-e761-5342-9869-7d0f3e9f67ae send: 141B guuid=2ff7f3be-2000-0000-696e-6a30eb0a0000 pid=2795->c36a0b40-e761-5342-9869-7d0f3e9f67ae send: 142B guuid=a40945c5-2000-0000-696e-6a30ff0a0000 pid=2815->c36a0b40-e761-5342-9869-7d0f3e9f67ae send: 138B guuid=081498ca-2000-0000-696e-6a30050b0000 pid=2821 /tmp/kitty.x86 net send-data zombie guuid=752b7aca-2000-0000-696e-6a30040b0000 pid=2820->guuid=081498ca-2000-0000-696e-6a30050b0000 pid=2821 clone eb9dca7b-d301-522e-83c7-8d6f291efc38 66.78.40.221:9080 guuid=081498ca-2000-0000-696e-6a30050b0000 pid=2821->eb9dca7b-d301-522e-83c7-8d6f291efc38 send: 72B 54d92a3b-1447-55af-b534-047898c60c8d 1.1.1.1:53 guuid=081498ca-2000-0000-696e-6a30050b0000 pid=2821->54d92a3b-1447-55af-b534-047898c60c8d send: 40B 6a6ce952-23cd-5c51-b461-6ca6a8c64225 1.0.0.1:53 guuid=081498ca-2000-0000-696e-6a30050b0000 pid=2821->6a6ce952-23cd-5c51-b461-6ca6a8c64225 send: 40B guuid=83f3deca-2000-0000-696e-6a30070b0000 pid=2823->c36a0b40-e761-5342-9869-7d0f3e9f67ae send: 141B guuid=b1f824d0-2000-0000-696e-6a30110b0000 pid=2833 /tmp/kitty.x86_64 net send-data zombie guuid=c37a11d0-2000-0000-696e-6a30100b0000 pid=2832->guuid=b1f824d0-2000-0000-696e-6a30110b0000 pid=2833 clone guuid=b1f824d0-2000-0000-696e-6a30110b0000 pid=2833->eb9dca7b-d301-522e-83c7-8d6f291efc38 send: 37B guuid=b1f824d0-2000-0000-696e-6a30110b0000 pid=2833->54d92a3b-1447-55af-b534-047898c60c8d send: 40B
Threat name:
Linux.Worm.Mirai
Status:
Malicious
First seen:
2025-08-23 19:40:55 UTC
File Type:
Text (Shell)
AV detection:
16 of 38 (42.11%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Modifies registry class
Suspicious use of SetWindowsHookEx
Enumerates physical storage devices
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh 13bcc2e6defd3b38a63800870cc248ce349798244f36698db955501b91cbf86a

(this sample)

  
Delivery method
Distributed via web download

Comments