MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 158da673a25f474f0622b54d2ebd58c31b2d6d69e25fd0d64ba508bab98d1c76. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: 158da673a25f474f0622b54d2ebd58c31b2d6d69e25fd0d64ba508bab98d1c76
SHA3-384 hash: bb1240dcff8bfad954e35a57d73a35f8db434b026ae779e1b50ac05b419f5642e0e84943d0ceb796d1dc68735e1b092c
SHA1 hash: 2f559a4a699efd61d610838ba3e254e80dc3a6c3
MD5 hash: bb476c3e22738011c377454b83f3fd19
humanhash: red-steak-michigan-alanine
File name:k
Download: download sample
Signature Mirai
File size:548 bytes
First seen:2026-02-01 07:32:43 UTC
Last seen:Never
File type: sh
MIME type:text/plain
ssdeep 12:zmKdge3s3AzdgL3s3A8dgyZ3s3ApHdgyoH3s3AMW5dgy+3s3/:zmKd1csdccxdRZcCdRoHci5dR+c/
TLSH T19FF054D9601734E1315D5D442273FC14BB91E15C97B12F911DCC18EB8A8CA04B70CE64
Magika shell
Reporter abuse_ch
Tags:mirai sh
URLMalware sample (SHA256 hash)SignatureTags
http://130.12.180.20:36695/mpslfcc742b8f1948c436d4c9037b8cc2aae0200714fd8d4bad28f87a6b45f718603 Miraielf geofenced mips mirai ua-wget USA
http://130.12.180.20:36695/mips115ba7461c23928d82557c16bf70b0b1b06d0dcec8a28622463d349ee696d4b0 Miraielf gafgyt geofenced mips mirai ua-wget USA
http://130.12.180.20:36695/arm1ac2472a7266925354978d482153be974077046d46a8126b9fbd19bd4646eab2 Miraielf mirai ua-wget
http://130.12.180.20:36695/arm5645e42550a44d8d0e0a2abe2b214eed4a608425b4107b9eac8d13a3121f1971a Miraiarm elf geofenced mirai ua-wget USA
http://130.12.180.20:36695/arm75f522e269bf35cf78d80e6341ec953775adbffaf35871f710255f81d5ca0723c Miraiarm elf geofenced mirai ua-wget USA

Intelligence


File Origin
# of uploads :
1
# of downloads :
93
Origin country :
DE DE
Vendor Threat Intelligence
Gathering data
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
evasive mirai
Verdict:
Malicious
File Type:
text
First seen:
2026-02-01T04:49:00Z UTC
Last seen:
2026-02-01T04:56:00Z UTC
Hits:
~10
Detections:
HEUR:Trojan-Downloader.Shell.Agent.p HEUR:Trojan-Downloader.Shell.Agent.a
Status:
terminated
Behavior Graph:
%3 guuid=26ea56f0-1900-0000-3cc2-3351140a0000 pid=2580 /usr/bin/sudo guuid=641dc6f2-1900-0000-3cc2-33511b0a0000 pid=2587 /tmp/sample.bin guuid=26ea56f0-1900-0000-3cc2-3351140a0000 pid=2580->guuid=641dc6f2-1900-0000-3cc2-33511b0a0000 pid=2587 execve guuid=6ef226f3-1900-0000-3cc2-33511d0a0000 pid=2589 /usr/bin/rm guuid=641dc6f2-1900-0000-3cc2-33511b0a0000 pid=2587->guuid=6ef226f3-1900-0000-3cc2-33511d0a0000 pid=2589 execve guuid=f8ccb8f3-1900-0000-3cc2-33511e0a0000 pid=2590 /usr/bin/wget net guuid=641dc6f2-1900-0000-3cc2-33511b0a0000 pid=2587->guuid=f8ccb8f3-1900-0000-3cc2-33511e0a0000 pid=2590 execve guuid=90fe80f7-1900-0000-3cc2-3351270a0000 pid=2599 /usr/bin/chmod guuid=641dc6f2-1900-0000-3cc2-33511b0a0000 pid=2587->guuid=90fe80f7-1900-0000-3cc2-3351270a0000 pid=2599 execve guuid=7740e0f7-1900-0000-3cc2-3351290a0000 pid=2601 /tmp/dvrHelper guuid=641dc6f2-1900-0000-3cc2-33511b0a0000 pid=2587->guuid=7740e0f7-1900-0000-3cc2-3351290a0000 pid=2601 execve guuid=fea562f9-1900-0000-3cc2-33512f0a0000 pid=2607 /usr/bin/rm guuid=641dc6f2-1900-0000-3cc2-33511b0a0000 pid=2587->guuid=fea562f9-1900-0000-3cc2-33512f0a0000 pid=2607 execve guuid=1fa29df9-1900-0000-3cc2-3351310a0000 pid=2609 /usr/bin/wget net guuid=641dc6f2-1900-0000-3cc2-33511b0a0000 pid=2587->guuid=1fa29df9-1900-0000-3cc2-3351310a0000 pid=2609 execve guuid=ca7050fb-1900-0000-3cc2-3351360a0000 pid=2614 /usr/bin/chmod guuid=641dc6f2-1900-0000-3cc2-33511b0a0000 pid=2587->guuid=ca7050fb-1900-0000-3cc2-3351360a0000 pid=2614 execve guuid=fcd089fb-1900-0000-3cc2-3351380a0000 pid=2616 /tmp/dvrHelper guuid=641dc6f2-1900-0000-3cc2-33511b0a0000 pid=2587->guuid=fcd089fb-1900-0000-3cc2-3351380a0000 pid=2616 execve guuid=649864fc-1900-0000-3cc2-33513d0a0000 pid=2621 /usr/bin/rm guuid=641dc6f2-1900-0000-3cc2-33511b0a0000 pid=2587->guuid=649864fc-1900-0000-3cc2-33513d0a0000 pid=2621 execve guuid=b1ccc4fc-1900-0000-3cc2-3351400a0000 pid=2624 /usr/bin/wget net guuid=641dc6f2-1900-0000-3cc2-33511b0a0000 pid=2587->guuid=b1ccc4fc-1900-0000-3cc2-3351400a0000 pid=2624 execve guuid=a2ee8dfe-1900-0000-3cc2-3351470a0000 pid=2631 /usr/bin/chmod guuid=641dc6f2-1900-0000-3cc2-33511b0a0000 pid=2587->guuid=a2ee8dfe-1900-0000-3cc2-3351470a0000 pid=2631 execve guuid=52b5ddfe-1900-0000-3cc2-33514a0a0000 pid=2634 /tmp/dvrHelper guuid=641dc6f2-1900-0000-3cc2-33511b0a0000 pid=2587->guuid=52b5ddfe-1900-0000-3cc2-33514a0a0000 pid=2634 execve guuid=041f7aff-1900-0000-3cc2-33514e0a0000 pid=2638 /usr/bin/rm guuid=641dc6f2-1900-0000-3cc2-33511b0a0000 pid=2587->guuid=041f7aff-1900-0000-3cc2-33514e0a0000 pid=2638 execve guuid=bd13b4ff-1900-0000-3cc2-3351500a0000 pid=2640 /usr/bin/wget net guuid=641dc6f2-1900-0000-3cc2-33511b0a0000 pid=2587->guuid=bd13b4ff-1900-0000-3cc2-3351500a0000 pid=2640 execve guuid=5e994b01-1a00-0000-3cc2-3351570a0000 pid=2647 /usr/bin/chmod guuid=641dc6f2-1900-0000-3cc2-33511b0a0000 pid=2587->guuid=5e994b01-1a00-0000-3cc2-3351570a0000 pid=2647 execve guuid=53948401-1a00-0000-3cc2-3351590a0000 pid=2649 /tmp/dvrHelper guuid=641dc6f2-1900-0000-3cc2-33511b0a0000 pid=2587->guuid=53948401-1a00-0000-3cc2-3351590a0000 pid=2649 execve guuid=bee23a02-1a00-0000-3cc2-33515e0a0000 pid=2654 /usr/bin/rm guuid=641dc6f2-1900-0000-3cc2-33511b0a0000 pid=2587->guuid=bee23a02-1a00-0000-3cc2-33515e0a0000 pid=2654 execve guuid=71067702-1a00-0000-3cc2-3351600a0000 pid=2656 /usr/bin/wget net guuid=641dc6f2-1900-0000-3cc2-33511b0a0000 pid=2587->guuid=71067702-1a00-0000-3cc2-3351600a0000 pid=2656 execve guuid=97247304-1a00-0000-3cc2-3351680a0000 pid=2664 /usr/bin/chmod guuid=641dc6f2-1900-0000-3cc2-33511b0a0000 pid=2587->guuid=97247304-1a00-0000-3cc2-3351680a0000 pid=2664 execve guuid=44c0b704-1a00-0000-3cc2-33516a0a0000 pid=2666 /tmp/dvrHelper guuid=641dc6f2-1900-0000-3cc2-33511b0a0000 pid=2587->guuid=44c0b704-1a00-0000-3cc2-33516a0a0000 pid=2666 execve b74d60aa-ce52-59bb-a391-58d03c545629 130.12.180.20:36695 guuid=f8ccb8f3-1900-0000-3cc2-33511e0a0000 pid=2590->b74d60aa-ce52-59bb-a391-58d03c545629 con guuid=1fa29df9-1900-0000-3cc2-3351310a0000 pid=2609->b74d60aa-ce52-59bb-a391-58d03c545629 con guuid=b1ccc4fc-1900-0000-3cc2-3351400a0000 pid=2624->b74d60aa-ce52-59bb-a391-58d03c545629 con guuid=bd13b4ff-1900-0000-3cc2-3351500a0000 pid=2640->b74d60aa-ce52-59bb-a391-58d03c545629 con guuid=71067702-1a00-0000-3cc2-3351600a0000 pid=2656->b74d60aa-ce52-59bb-a391-58d03c545629 con
Verdict:
Malicious
Threat:
Trojan-Downloader.Shell.Agent
Threat name:
Linux.Downloader.Generic
Status:
Suspicious
First seen:
2026-02-01 07:16:58 UTC
File Type:
Text (Shell)
AV detection:
10 of 36 (27.78%)
Threat level:
  3/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Modifies registry class
Suspicious use of SetWindowsHookEx
Enumerates physical storage devices
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh 158da673a25f474f0622b54d2ebd58c31b2d6d69e25fd0d64ba508bab98d1c76

(this sample)

  
Delivery method
Distributed via web download

Comments