MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 155550b63c50405ceb597a8bf1ebe60f724a9c44a1e50f2d26a6327cc4d817a0. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 7


Intelligence 7 IOCs YARA 1 File information Comments

SHA256 hash: 155550b63c50405ceb597a8bf1ebe60f724a9c44a1e50f2d26a6327cc4d817a0
SHA3-384 hash: e9f2acf98bcb19e69fe9aae4e656ad1846617d11e4166c886394a2a4a65a53207f3a7f277169fa6698b753dce8698fde
SHA1 hash: 05159be63546771d2bfd7de4c186e8123ecd34de
MD5 hash: 024a5b38fce959a00e183d01187d0dc0
humanhash: summer-pizza-massachusetts-ink
File name:tplinkwan.sh
Download: download sample
Signature Mirai
File size:3'120 bytes
First seen:2026-03-19 05:24:17 UTC
Last seen:Never
File type: sh
MIME type:text/x-shellscript
ssdeep 48:mUBzEpcCCqP7k0HIFYFWFFFFOWJQp1xEtZrRxHbbibPZF6FYFWFFFRIuENF:tBEB9rEuiy
TLSH T14F51138C7421942788C58D4CB657E35793EC93A4E69CC01D9560FE3B3852BEA7AFAF40
TrID 70.0% (.SH) Linux/UNIX shell script (7000/1)
30.0% (.) Unix-like shebang (var.3) (gen) (3000/1)
Magika shell
Reporter Skynet11
Tags:mirai sh
URLMalware sample (SHA256 hash)SignatureTags
http://88.214.20.14/bins/tuxnokill.x86be902e86ec68515e23a3387a21e80d098d258223ce562598c27ee6d89b83ff2b Miraimirai
http://88.214.20.14/bins/tuxnokill.mipsd232c0960f24ba4bb369821b1bf2836d9e576a34fa3ddca2618c80b2f54277f7 Miraimirai
http://88.214.20.14/bins/tuxnokill.mpsl7792f5c1d5c6c6415732ba0f63328549e19cc9c182c258c17b97b77fdb5541b8 Miraimirai
http://88.214.20.14/bins/tuxnokill.armca75aa84821ab28adae9c0ccb6fd5cf318ea38c3f26984027e2e3e8b2e23303a Miraimirai
http://88.214.20.14/bins/tuxnokill.arc557a7680cac8a83c98f5059b6c11dda33df085e931a53817685ad6427645a3c9 Miraimirai
http://88.214.20.14/bins/tuxnokill.arm4n/an/aelf ua-wget
http://88.214.20.14/bins/tuxnokill.arm5d3e8db8315b0c11a575da587fd60b54b026cbd631cec72dec5a3a07706f2a6a7 Miraimirai
http://88.214.20.14/bins/tuxnokill.arm66050b4c3def76eddfe712c0333f181c499848a187580bb845b1c4a0dca93ee30 Miraimirai
http://88.214.20.14/bins/tuxnokill.arm732ca4b70e84787144574bfdb85a0092f3ebf524bb78febdd28d4c832b53fe100 Miraimirai
http://88.214.20.14/bins/tuxnokill.ppc0b7bea135dc3b2cda590959c9cc847949c56b0e8d4c5f7ce9ac6dd2590aa6b71 Miraimirai
http://88.214.20.14/bins/tuxnokill.m68k4c4e68e8e4545367bdd686c5ecea87d87a10b27e4b7d4e5229d66b58269e7ffa Miraimirai
http://88.214.20.14/bins/tuxnokill.sh4ae479532635b3ea5e296c9266f09cf7a0b532b3c731ba96885a719372396de55 Miraimirai

Intelligence


File Origin
# of uploads :
1
# of downloads :
81
Origin country :
AU AU
Vendor Threat Intelligence
No detections
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
evasive
Verdict:
Malicious
File Type:
unix shell
Detections:
HEUR:Trojan-Downloader.Shell.Agent.gen
Status:
terminated
Behavior Graph:
%3 guuid=b9872130-1700-0000-1a0f-0ffa5b0d0000 pid=3419 /usr/bin/sudo guuid=fac9fc31-1700-0000-1a0f-0ffa610d0000 pid=3425 /tmp/sample.bin guuid=b9872130-1700-0000-1a0f-0ffa5b0d0000 pid=3419->guuid=fac9fc31-1700-0000-1a0f-0ffa610d0000 pid=3425 execve guuid=9c6b4932-1700-0000-1a0f-0ffa630d0000 pid=3427 /usr/bin/wget guuid=fac9fc31-1700-0000-1a0f-0ffa610d0000 pid=3425->guuid=9c6b4932-1700-0000-1a0f-0ffa630d0000 pid=3427 execve
Threat name:
Script-Shell.Trojan.Vigorf
Status:
Malicious
First seen:
2026-03-19 01:35:17 UTC
File Type:
Text (Shell)
AV detection:
8 of 24 (33.33%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
linux
Behaviour
Writes file to tmp directory
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:MAL_Linux_IoT_MultiArch_BotnetLoader_Generic
Author:Anish Bogati
Description:Technique-based detection of IoT/Linux botnet loader shell scripts downloading binaries from numeric IPs, chmodding, and executing multi-architecture payloads
Reference:MalwareBazaar sample lilin.sh

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Mirai

sh 155550b63c50405ceb597a8bf1ebe60f724a9c44a1e50f2d26a6327cc4d817a0

(this sample)

Comments