MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 1e86b2d77df76ee7ceecc699868b15b11c6eb7912966fea5a7c0721f427c7aca. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 5


Intelligence 5 IOCs YARA 1 File information Comments

SHA256 hash: 1e86b2d77df76ee7ceecc699868b15b11c6eb7912966fea5a7c0721f427c7aca
SHA3-384 hash: e08225ec965c3f892389b1989f3e1bf5501e1e55680e0ae100150e53ce732534212d9ee32ec6f2e5016d6c0e5358cd49
SHA1 hash: c7ddfc3d6c2768d238fc3519ad77303c6b0f66ef
MD5 hash: 68f3a01a13b20010c4a6e427cfc8a6e1
humanhash: zebra-steak-equal-mars
File name:w.sh
Download: download sample
Signature Mirai
File size:1'018 bytes
First seen:2026-01-11 06:38:34 UTC
Last seen:Never
File type: sh
MIME type:text/plain
ssdeep 24:iBgm16NIIoIKSf824l95k9m6lyTl+w+qG/HR:iBgm1AoIxf82C95k9m6lyTl+w+qG/x
TLSH T1D21158CA0198D83908F8CC4C30EDD529A9BDA7D438614B6CAC5D54F371979B86F59F8C
Magika batch
Reporter abuse_ch
Tags:sh
URLMalware sample (SHA256 hash)SignatureTags
http://31.59.58.26/main_armb9609e8857f4a5e96b74c1fefdb1758ad17d9d0f61519979c45b71ec673775b1 Miraielf mirai ua-wget
http://31.59.58.26/main_arm5d7cd33558dc7b61bd0280c4a034fceaa94d9999786ebf3ac1e11e268ee49dac6 Miraielf mirai ua-wget
http://31.59.58.26/main_arm6d23c1173da8453e626682040bcc70f16feb077178092f09e867630805c79e084 Miraielf mirai ua-wget
http://31.59.58.26/main_arm7e72bf6b7fa14a9381c0bf3d53d30fa8241bd4ea0e2120f8bfb6abdbcab1bea9a Miraielf mirai ua-wget
http://31.59.58.26/main_m68k5a9e7b5506932ac1d05874291f15bb22288e9eb5a67eb9de697842aed0a1a231 Miraielf mirai ua-wget
http://31.59.58.26/main_mips626b1a35e650708831b2b7635d4dc0e55c851793b2dce022d8da5ec4d6f9b8ab Miraielf mirai ua-wget
http://31.59.58.26/main_mpsl680747b4f84f243e6ac93a74301f386a54312fbfade552d2e56cbb17719d5447 Miraielf mirai ua-wget
http://31.59.58.26/main_ppc91d4adc3bc5b7089d7e5b973960b92d0f5debed3ce8db8d33bbcec99372f138c Miraielf mirai ua-wget
http://31.59.58.26/main_sh42a55b329a7fe41c957bb43bb3b0837cf444f9157636727c5d9c36b8bb79d8e9f Miraielf mirai ua-wget
http://31.59.58.26/main_spcn/an/aelf ua-wget
http://31.59.58.26/main_x8650f0dae24f260c2192970644904f97b116180eccf0b4fe291d818376ea4eeff7 Miraielf mirai ua-wget
http://31.59.58.26/main_x86_64n/an/aelf ua-wget

Intelligence


File Origin
# of uploads :
1
# of downloads :
43
Origin country :
DE DE
Vendor Threat Intelligence
No detections
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
busybox mirai
Status:
terminated
Behavior Graph:
%3 guuid=d8b6c551-1a00-0000-b961-647793090000 pid=2451 /usr/bin/sudo guuid=0f5ed454-1a00-0000-b961-647799090000 pid=2457 /tmp/sample.bin guuid=d8b6c551-1a00-0000-b961-647793090000 pid=2451->guuid=0f5ed454-1a00-0000-b961-647799090000 pid=2457 execve guuid=46133355-1a00-0000-b961-64779a090000 pid=2458 /usr/bin/busybox net send-data write-file guuid=0f5ed454-1a00-0000-b961-647799090000 pid=2457->guuid=46133355-1a00-0000-b961-64779a090000 pid=2458 execve guuid=6e757157-1a00-0000-b961-64779f090000 pid=2463 /usr/bin/chmod guuid=0f5ed454-1a00-0000-b961-647799090000 pid=2457->guuid=6e757157-1a00-0000-b961-64779f090000 pid=2463 execve guuid=14ffc157-1a00-0000-b961-6477a1090000 pid=2465 /usr/bin/dash guuid=0f5ed454-1a00-0000-b961-647799090000 pid=2457->guuid=14ffc157-1a00-0000-b961-6477a1090000 pid=2465 clone guuid=b4dc7f59-1a00-0000-b961-6477a8090000 pid=2472 /usr/bin/busybox net send-data write-file guuid=0f5ed454-1a00-0000-b961-647799090000 pid=2457->guuid=b4dc7f59-1a00-0000-b961-6477a8090000 pid=2472 execve guuid=739dbc63-1a00-0000-b961-6477c2090000 pid=2498 /usr/bin/chmod guuid=0f5ed454-1a00-0000-b961-647799090000 pid=2457->guuid=739dbc63-1a00-0000-b961-6477c2090000 pid=2498 execve guuid=8a321d64-1a00-0000-b961-6477c3090000 pid=2499 /usr/bin/dash guuid=0f5ed454-1a00-0000-b961-647799090000 pid=2457->guuid=8a321d64-1a00-0000-b961-6477c3090000 pid=2499 clone guuid=f64c1065-1a00-0000-b961-6477c6090000 pid=2502 /usr/bin/busybox net send-data write-file guuid=0f5ed454-1a00-0000-b961-647799090000 pid=2457->guuid=f64c1065-1a00-0000-b961-6477c6090000 pid=2502 execve guuid=f5641668-1a00-0000-b961-6477cc090000 pid=2508 /usr/bin/chmod guuid=0f5ed454-1a00-0000-b961-647799090000 pid=2457->guuid=f5641668-1a00-0000-b961-6477cc090000 pid=2508 execve guuid=e937c468-1a00-0000-b961-6477ce090000 pid=2510 /usr/bin/dash guuid=0f5ed454-1a00-0000-b961-647799090000 pid=2457->guuid=e937c468-1a00-0000-b961-6477ce090000 pid=2510 clone guuid=2d2f7f6a-1a00-0000-b961-6477d4090000 pid=2516 /usr/bin/busybox net send-data write-file guuid=0f5ed454-1a00-0000-b961-647799090000 pid=2457->guuid=2d2f7f6a-1a00-0000-b961-6477d4090000 pid=2516 execve guuid=f601096f-1a00-0000-b961-6477db090000 pid=2523 /usr/bin/chmod guuid=0f5ed454-1a00-0000-b961-647799090000 pid=2457->guuid=f601096f-1a00-0000-b961-6477db090000 pid=2523 execve guuid=9a0c6c6f-1a00-0000-b961-6477dd090000 pid=2525 /usr/bin/dash guuid=0f5ed454-1a00-0000-b961-647799090000 pid=2457->guuid=9a0c6c6f-1a00-0000-b961-6477dd090000 pid=2525 clone guuid=060f4170-1a00-0000-b961-6477e1090000 pid=2529 /usr/bin/busybox net send-data write-file guuid=0f5ed454-1a00-0000-b961-647799090000 pid=2457->guuid=060f4170-1a00-0000-b961-6477e1090000 pid=2529 execve guuid=da1df173-1a00-0000-b961-6477e8090000 pid=2536 /usr/bin/chmod guuid=0f5ed454-1a00-0000-b961-647799090000 pid=2457->guuid=da1df173-1a00-0000-b961-6477e8090000 pid=2536 execve guuid=7e3b4b74-1a00-0000-b961-6477ea090000 pid=2538 /usr/bin/dash guuid=0f5ed454-1a00-0000-b961-647799090000 pid=2457->guuid=7e3b4b74-1a00-0000-b961-6477ea090000 pid=2538 clone guuid=d891d874-1a00-0000-b961-6477ed090000 pid=2541 /usr/bin/busybox net send-data write-file guuid=0f5ed454-1a00-0000-b961-647799090000 pid=2457->guuid=d891d874-1a00-0000-b961-6477ed090000 pid=2541 execve guuid=05717978-1a00-0000-b961-6477f4090000 pid=2548 /usr/bin/chmod guuid=0f5ed454-1a00-0000-b961-647799090000 pid=2457->guuid=05717978-1a00-0000-b961-6477f4090000 pid=2548 execve guuid=f791b778-1a00-0000-b961-6477f5090000 pid=2549 /usr/bin/dash guuid=0f5ed454-1a00-0000-b961-647799090000 pid=2457->guuid=f791b778-1a00-0000-b961-6477f5090000 pid=2549 clone guuid=60c3b77b-1a00-0000-b961-6477fe090000 pid=2558 /usr/bin/busybox net send-data write-file guuid=0f5ed454-1a00-0000-b961-647799090000 pid=2457->guuid=60c3b77b-1a00-0000-b961-6477fe090000 pid=2558 execve guuid=69222b7e-1a00-0000-b961-6477030a0000 pid=2563 /usr/bin/chmod guuid=0f5ed454-1a00-0000-b961-647799090000 pid=2457->guuid=69222b7e-1a00-0000-b961-6477030a0000 pid=2563 execve guuid=c986ae7e-1a00-0000-b961-6477040a0000 pid=2564 /usr/bin/dash guuid=0f5ed454-1a00-0000-b961-647799090000 pid=2457->guuid=c986ae7e-1a00-0000-b961-6477040a0000 pid=2564 clone guuid=c23ca67f-1a00-0000-b961-6477060a0000 pid=2566 /usr/bin/busybox net send-data write-file guuid=0f5ed454-1a00-0000-b961-647799090000 pid=2457->guuid=c23ca67f-1a00-0000-b961-6477060a0000 pid=2566 execve guuid=18c7ae81-1a00-0000-b961-64770c0a0000 pid=2572 /usr/bin/chmod guuid=0f5ed454-1a00-0000-b961-647799090000 pid=2457->guuid=18c7ae81-1a00-0000-b961-64770c0a0000 pid=2572 execve guuid=2da0fc81-1a00-0000-b961-64770e0a0000 pid=2574 /usr/bin/dash guuid=0f5ed454-1a00-0000-b961-647799090000 pid=2457->guuid=2da0fc81-1a00-0000-b961-64770e0a0000 pid=2574 clone guuid=97adb082-1a00-0000-b961-6477120a0000 pid=2578 /usr/bin/busybox net send-data write-file guuid=0f5ed454-1a00-0000-b961-647799090000 pid=2457->guuid=97adb082-1a00-0000-b961-6477120a0000 pid=2578 execve guuid=e1558485-1a00-0000-b961-6477190a0000 pid=2585 /usr/bin/chmod guuid=0f5ed454-1a00-0000-b961-647799090000 pid=2457->guuid=e1558485-1a00-0000-b961-6477190a0000 pid=2585 execve guuid=333ede85-1a00-0000-b961-64771b0a0000 pid=2587 /usr/bin/dash guuid=0f5ed454-1a00-0000-b961-647799090000 pid=2457->guuid=333ede85-1a00-0000-b961-64771b0a0000 pid=2587 clone guuid=edf5b786-1a00-0000-b961-64771e0a0000 pid=2590 /usr/bin/busybox net send-data guuid=0f5ed454-1a00-0000-b961-647799090000 pid=2457->guuid=edf5b786-1a00-0000-b961-64771e0a0000 pid=2590 execve guuid=60dcae87-1a00-0000-b961-6477210a0000 pid=2593 /usr/bin/chmod guuid=0f5ed454-1a00-0000-b961-647799090000 pid=2457->guuid=60dcae87-1a00-0000-b961-6477210a0000 pid=2593 execve guuid=419dee87-1a00-0000-b961-6477230a0000 pid=2595 /usr/bin/dash guuid=0f5ed454-1a00-0000-b961-647799090000 pid=2457->guuid=419dee87-1a00-0000-b961-6477230a0000 pid=2595 clone guuid=54c1ff87-1a00-0000-b961-6477240a0000 pid=2596 /usr/bin/busybox net send-data write-file guuid=0f5ed454-1a00-0000-b961-647799090000 pid=2457->guuid=54c1ff87-1a00-0000-b961-6477240a0000 pid=2596 execve guuid=b366aa89-1a00-0000-b961-6477290a0000 pid=2601 /usr/bin/chmod guuid=0f5ed454-1a00-0000-b961-647799090000 pid=2457->guuid=b366aa89-1a00-0000-b961-6477290a0000 pid=2601 execve guuid=7ee2088a-1a00-0000-b961-64772b0a0000 pid=2603 /home/sandbox/main_x86 delete-file net guuid=0f5ed454-1a00-0000-b961-647799090000 pid=2457->guuid=7ee2088a-1a00-0000-b961-64772b0a0000 pid=2603 execve guuid=8e914e8a-1a00-0000-b961-64772e0a0000 pid=2606 /usr/bin/busybox net send-data guuid=0f5ed454-1a00-0000-b961-647799090000 pid=2457->guuid=8e914e8a-1a00-0000-b961-64772e0a0000 pid=2606 execve guuid=040d668b-1a00-0000-b961-6477330a0000 pid=2611 /usr/bin/chmod guuid=0f5ed454-1a00-0000-b961-647799090000 pid=2457->guuid=040d668b-1a00-0000-b961-6477330a0000 pid=2611 execve guuid=0602a28b-1a00-0000-b961-6477350a0000 pid=2613 /home/sandbox/main_x86_64 guuid=0f5ed454-1a00-0000-b961-647799090000 pid=2457->guuid=0602a28b-1a00-0000-b961-6477350a0000 pid=2613 execve guuid=a218668c-1a00-0000-b961-6477380a0000 pid=2616 /usr/bin/rm delete-file guuid=0f5ed454-1a00-0000-b961-647799090000 pid=2457->guuid=a218668c-1a00-0000-b961-6477380a0000 pid=2616 execve 53991375-1b28-53bc-a2e5-f05076b69828 31.59.58.26:80 guuid=46133355-1a00-0000-b961-64779a090000 pid=2458->53991375-1b28-53bc-a2e5-f05076b69828 send: 82B guuid=b4dc7f59-1a00-0000-b961-6477a8090000 pid=2472->53991375-1b28-53bc-a2e5-f05076b69828 send: 83B guuid=f64c1065-1a00-0000-b961-6477c6090000 pid=2502->53991375-1b28-53bc-a2e5-f05076b69828 send: 83B guuid=2d2f7f6a-1a00-0000-b961-6477d4090000 pid=2516->53991375-1b28-53bc-a2e5-f05076b69828 send: 83B guuid=060f4170-1a00-0000-b961-6477e1090000 pid=2529->53991375-1b28-53bc-a2e5-f05076b69828 send: 83B guuid=d891d874-1a00-0000-b961-6477ed090000 pid=2541->53991375-1b28-53bc-a2e5-f05076b69828 send: 83B guuid=60c3b77b-1a00-0000-b961-6477fe090000 pid=2558->53991375-1b28-53bc-a2e5-f05076b69828 send: 83B guuid=c23ca67f-1a00-0000-b961-6477060a0000 pid=2566->53991375-1b28-53bc-a2e5-f05076b69828 send: 82B guuid=97adb082-1a00-0000-b961-6477120a0000 pid=2578->53991375-1b28-53bc-a2e5-f05076b69828 send: 82B guuid=edf5b786-1a00-0000-b961-64771e0a0000 pid=2590->53991375-1b28-53bc-a2e5-f05076b69828 send: 82B guuid=54c1ff87-1a00-0000-b961-6477240a0000 pid=2596->53991375-1b28-53bc-a2e5-f05076b69828 send: 82B 8b0a01dc-0728-52c1-8024-c4ba7801b8d6 8.8.8.8:53 guuid=7ee2088a-1a00-0000-b961-64772b0a0000 pid=2603->8b0a01dc-0728-52c1-8024-c4ba7801b8d6 con guuid=aa63408a-1a00-0000-b961-64772d0a0000 pid=2605 /home/sandbox/main_x86 dns net send-data zombie guuid=7ee2088a-1a00-0000-b961-64772b0a0000 pid=2603->guuid=aa63408a-1a00-0000-b961-64772d0a0000 pid=2605 clone guuid=aa63408a-1a00-0000-b961-64772d0a0000 pid=2605->8b0a01dc-0728-52c1-8024-c4ba7801b8d6 send: 32B e0479097-b2f2-5f0c-a59d-d6eea8794184 kidlipsy.cloud:1995 guuid=aa63408a-1a00-0000-b961-64772d0a0000 pid=2605->e0479097-b2f2-5f0c-a59d-d6eea8794184 send: 15B guuid=b0cf558a-1a00-0000-b961-64772f0a0000 pid=2607 /home/sandbox/main_x86 guuid=aa63408a-1a00-0000-b961-64772d0a0000 pid=2605->guuid=b0cf558a-1a00-0000-b961-64772f0a0000 pid=2607 clone guuid=8e914e8a-1a00-0000-b961-64772e0a0000 pid=2606->53991375-1b28-53bc-a2e5-f05076b69828 send: 85B
Threat name:
Document-HTML.Trojan.Egairtigado
Status:
Malicious
First seen:
2026-01-11 06:20:30 UTC
File Type:
Text (Shell)
AV detection:
14 of 24 (58.33%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Modifies registry class
Suspicious use of SetWindowsHookEx
Enumerates physical storage devices
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:MAL_Linux_IoT_MultiArch_BotnetLoader_Generic
Author:Anish Bogati
Description:Technique-based detection of IoT/Linux botnet loader shell scripts downloading binaries from numeric IPs, chmodding, and executing multi-architecture payloads
Reference:MalwareBazaar sample lilin.sh

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh 1e86b2d77df76ee7ceecc699868b15b11c6eb7912966fea5a7c0721f427c7aca

(this sample)

  
Delivery method
Distributed via web download

Comments