MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 16fbcffc53a4f39b8b9491e00fc5c7e46c89deff564d5d44b5a8e18535c3a02e. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 9


Intelligence 9 IOCs YARA 2 File information Comments

SHA256 hash: 16fbcffc53a4f39b8b9491e00fc5c7e46c89deff564d5d44b5a8e18535c3a02e
SHA3-384 hash: 16c90a8b21a414bca221ca0380f16ffd41c132c44ee8947733322d8b40cfb3c80be5fb1f17ea09aadb5c4b900e16439e
SHA1 hash: 9d2979c119c94376487b13bbc9e632c0e7a99d62
MD5 hash: 193169dbbc77876ab1972161eef1f116
humanhash: failed-may-single-alabama
File name:1.sh
Download: download sample
Signature Mirai
File size:2'489 bytes
First seen:2025-12-20 07:11:01 UTC
Last seen:Never
File type: sh
MIME type:text/x-shellscript
ssdeep 48:iXyxGyVBGUG9kH+n+LPJyKFBlJ1rl0mp1:iXyxBMUG9Hn+LhyKFBRr51
TLSH T15F5118CE30520A316EB2DD6376B9D40C72C990CA51DA7F4B98EC38F4C1EDD087A54EA2
TrID 70.0% (.SH) Linux/UNIX shell script (7000/1)
30.0% (.) Unix-like shebang (var.3) (gen) (3000/1)
Magika shell
Reporter abuse_ch
Tags:mirai sh
URLMalware sample (SHA256 hash)SignatureTags
http://87.121.84.111/nx86ff1ebd10f36cf8b2e7f4ac99c701683c3dc07f650ebdbd88354633f3b58626ac Miraielf mirai ua-wget
http://87.121.84.111/nmips45c6143514d94b293ff80494fedcbb0775288b015bcd676bb6795492ffa87cec Miraielf mirai ua-wget
http://87.121.84.111/narc19c8200b771ea0702045ba77a8f3b1ab87f266663862cbfb6d2e4cce0ba1f1cc Miraielf mirai ua-wget
http://87.121.84.111/ni468n/an/aelf ua-wget
http://87.121.84.111/ni6863ef9c49ac068db6603e6cde54f3da6bedea7558c1d97f4732409d77c924b74cb Miraielf mirai ua-wget
http://87.121.84.111/nx86_64de31588241986f5be236903b4299cafd3ed132d031552aedb37410778339ce40 Miraielf mirai ua-wget
http://87.121.84.111/nmpsl9c3e215a57d4d7924fa7777fa799e31de78548d9ac3404070b00bfddcc3e2854 Miraielf mirai ua-wget
http://87.121.84.111/narm3b04d7544a98c42cbdbaf3bb38a3ac31398c756b6a29d8ea6f8059454e76b9db Miraielf mirai ua-wget
http://87.121.84.111/narm54502ffdbd22df998c89975157d0d859eadccb5e299cf76737e51affe800381e5 Miraielf mirai ua-wget
http://87.121.84.111/narm6667de5e07ac22a6290bb25967816c44952820e0c4f8ad3d2627dfbf81ed247f9 Miraielf mirai ua-wget
http://87.121.84.111/narm7889aa39252634a01da54f4b6985b6e32986ce7fa1ac458f76377caf47b4ef9cf Miraielf mirai ua-wget
http://87.121.84.111/nppc845ab630fd6d8e39b6168386bdd8eef9d404d545f92b6df754144e8263280368 Miraielf mirai ua-wget
http://87.121.84.111/nspc677ebcf4adde88082f057303758bec36587568c2ba19a300229d2efe5dfcc2e6 Miraielf mirai ua-wget
http://87.121.84.111/nm68kd8d732c7a708d1a43e13850b1624394c03ef905c34514e01c5befb0acf1dc22c Miraielf mirai ua-wget
http://87.121.84.111/nsh42f355d7e48824c91d5f6163079627ce16c08f08eb8033ed31e5cb9eb3600c76c Miraielf mirai ua-wget

Intelligence


File Origin
# of uploads :
1
# of downloads :
50
Origin country :
DE DE
Vendor Threat Intelligence
No detections
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
busybox evasive medusa mirai
Verdict:
Malicious
File Type:
unix shell
First seen:
2025-12-20T04:18:00Z UTC
Last seen:
2025-12-21T02:00:00Z UTC
Hits:
~10
Detections:
HEUR:Trojan-Downloader.Shell.Agent.p HEUR:Trojan-Downloader.Shell.Agent.gen HEUR:Trojan-Downloader.Shell.Agent.a
Threat name:
Linux.Downloader.Medusa
Status:
Malicious
First seen:
2025-12-20 08:21:46 UTC
AV detection:
16 of 24 (66.67%)
Threat level:
  3/5
Result
Malware family:
Score:
  10/10
Tags:
family:mirai antivm botnet defense_evasion discovery linux upx
Behaviour
Reads runtime system information
System Network Configuration Discovery
Writes file to tmp directory
Changes its process name
Checks CPU configuration
UPX packed file
Deletes log files
Enumerates running processes
File and Directory Permissions Modification
Deletes Audit logs
Deletes journal logs
Deletes system logs
Executes dropped EXE
Mirai
Mirai family
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:ach_202412_suspect_bash_script
Author:abuse.ch
Description:Detects suspicious Linux bash scripts
Rule name:MAL_Linux_IoT_MultiArch_BotnetLoader_Generic
Author:Anish Bogati
Description:Technique-based detection of IoT/Linux botnet loader shell scripts downloading binaries from numeric IPs, chmodding, and executing multi-architecture payloads
Reference:MalwareBazaar sample lilin.sh

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh 16fbcffc53a4f39b8b9491e00fc5c7e46c89deff564d5d44b5a8e18535c3a02e

(this sample)

  
Delivery method
Distributed via web download

Comments