MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 1899dba3ef28e2db8fd2eb98da1d9c060778139469d9b5db047fe5c3e4906339. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 5


Intelligence 5 IOCs YARA 1 File information Comments

SHA256 hash: 1899dba3ef28e2db8fd2eb98da1d9c060778139469d9b5db047fe5c3e4906339
SHA3-384 hash: c80b1ea800695ec873b5e3093a47eca8413fda8c86bbe95cc9f963601ad14be9fbedd329dd00a41c6ab20e2753a9987d
SHA1 hash: 08a94d076cd257bbcce215618ceca84136b066de
MD5 hash: aab3639cad20e64b6fb1a4f99b34037c
humanhash: april-kitten-chicken-kitten
File name:c.sh
Download: download sample
Signature Mirai
File size:351 bytes
First seen:2026-03-05 07:21:33 UTC
Last seen:Never
File type: sh
MIME type:text/plain
ssdeep 6:1hG6KgFgB1/hIq9mQExB1/VCNIvblT+IMB1/7CgLKl2gBnUv:1TqteqARHtkNIjlTBAt7CiKl2EUv
TLSH T1E4E092CD0232083723DC8E84AA69A00A64806AC26A705A2C9C5900F70D80BDBAB4EF06
Magika shell
Reporter abuse_ch
Tags:sh
URLMalware sample (SHA256 hash)SignatureTags
http://130.12.180.69/bins/parm920ac1054baa05797944f7e50ac72c85f12a44b88216965426160065c310b22c Miraielf mirai ua-wget
http://130.12.180.69/bins/parm580f187a926dd3d9d54e28b65fb8ff6f97f6757a10840780219c7c632fe7d72fb Miraielf mirai ua-wget
http://130.12.180.69/bins/parm6cbd05ce746f97e9ced520f8ed41dd57da46bc0155666bff800a9884817e36db9 Miraielf mirai ua-wget
http://130.12.180.69/bins/parm720aaffdb55736fa2907b097ff5949393041aa6d91c580060a1f4f717676bcd92 Miraielf mirai ua-wget

Intelligence


File Origin
# of uploads :
1
# of downloads :
41
Origin country :
DE DE
Vendor Threat Intelligence
No detections
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
evasive mirai
Result
Gathering data
Status:
terminated
Behavior Graph:
%3 guuid=e9d3bd4b-1900-0000-348f-e6ff8d090000 pid=2445 /usr/bin/sudo guuid=10cdd74e-1900-0000-348f-e6ff96090000 pid=2454 /tmp/sample.bin guuid=e9d3bd4b-1900-0000-348f-e6ff8d090000 pid=2445->guuid=10cdd74e-1900-0000-348f-e6ff96090000 pid=2454 execve guuid=df78374f-1900-0000-348f-e6ff98090000 pid=2456 /usr/bin/chmod guuid=10cdd74e-1900-0000-348f-e6ff96090000 pid=2454->guuid=df78374f-1900-0000-348f-e6ff98090000 pid=2456 execve guuid=08b2ce4f-1900-0000-348f-e6ff99090000 pid=2457 /usr/bin/dash guuid=10cdd74e-1900-0000-348f-e6ff96090000 pid=2454->guuid=08b2ce4f-1900-0000-348f-e6ff99090000 pid=2457 clone guuid=117d0250-1900-0000-348f-e6ff9a090000 pid=2458 /usr/bin/chmod guuid=10cdd74e-1900-0000-348f-e6ff96090000 pid=2454->guuid=117d0250-1900-0000-348f-e6ff9a090000 pid=2458 execve guuid=0552af50-1900-0000-348f-e6ff9b090000 pid=2459 /usr/bin/dash guuid=10cdd74e-1900-0000-348f-e6ff96090000 pid=2454->guuid=0552af50-1900-0000-348f-e6ff9b090000 pid=2459 clone guuid=5e0ddb50-1900-0000-348f-e6ff9c090000 pid=2460 /usr/bin/chmod guuid=10cdd74e-1900-0000-348f-e6ff96090000 pid=2454->guuid=5e0ddb50-1900-0000-348f-e6ff9c090000 pid=2460 execve guuid=9c9a5251-1900-0000-348f-e6ff9e090000 pid=2462 /usr/bin/dash guuid=10cdd74e-1900-0000-348f-e6ff96090000 pid=2454->guuid=9c9a5251-1900-0000-348f-e6ff9e090000 pid=2462 clone guuid=3b7d6451-1900-0000-348f-e6ff9f090000 pid=2463 /usr/bin/chmod guuid=10cdd74e-1900-0000-348f-e6ff96090000 pid=2454->guuid=3b7d6451-1900-0000-348f-e6ff9f090000 pid=2463 execve guuid=491fcf51-1900-0000-348f-e6ffa1090000 pid=2465 /usr/bin/dash guuid=10cdd74e-1900-0000-348f-e6ff96090000 pid=2454->guuid=491fcf51-1900-0000-348f-e6ffa1090000 pid=2465 clone guuid=19e7de51-1900-0000-348f-e6ffa2090000 pid=2466 /usr/bin/rm delete-file guuid=10cdd74e-1900-0000-348f-e6ff96090000 pid=2454->guuid=19e7de51-1900-0000-348f-e6ffa2090000 pid=2466 execve
Gathering data
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Modifies registry class
Suspicious use of SetWindowsHookEx
Enumerates physical storage devices
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:MAL_Linux_IoT_MultiArch_BotnetLoader_Generic
Author:Anish Bogati
Description:Technique-based detection of IoT/Linux botnet loader shell scripts downloading binaries from numeric IPs, chmodding, and executing multi-architecture payloads
Reference:MalwareBazaar sample lilin.sh

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh 1899dba3ef28e2db8fd2eb98da1d9c060778139469d9b5db047fe5c3e4906339

(this sample)

  
Delivery method
Distributed via web download

Comments