MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 1fdd5aec31db9c85e82047efe44201b51dc0fbcce280e5e8b2740310bf7f0095. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 9


Intelligence 9 IOCs YARA 2 File information Comments

SHA256 hash: 1fdd5aec31db9c85e82047efe44201b51dc0fbcce280e5e8b2740310bf7f0095
SHA3-384 hash: a50e3696ef2e3b1f5338800713f873b44fec242b5c59ee8875cc373a4d62d39546316cf13e7abd69294032777eb71549
SHA1 hash: fee37b1f3b06fa6eb76097cb0050e23264ca431d
MD5 hash: b5a1de36261b7e5c84191ab5d2ebdf64
humanhash: may-king-maryland-magnesium
File name:1.sh
Download: download sample
Signature Mirai
File size:3'224 bytes
First seen:2026-01-13 14:33:46 UTC
Last seen:Never
File type: sh
MIME type:text/x-shellscript
ssdeep 24:Iti0RC0R8si0RyW0RyK9i0Rw0R53i0Rj0R2lOi0RZ0RKsi0RB0R/i0Rsp0RsV2JA:ipWSK9zMy6Y9V01XOwgLJJUOjCUN/
TLSH T16761449909B2153A3CD19A52B669C11572A0C7A5A1CE6ECBFBF8BCE6904DE1CF003761
TrID 70.0% (.SH) Linux/UNIX shell script (7000/1)
30.0% (.) Unix-like shebang (var.3) (gen) (3000/1)
Magika shell
Reporter abuse_ch
Tags:mirai sh
URLMalware sample (SHA256 hash)SignatureTags
http://202.1.31.174/johenlastgen/johen.x86148ab876a1369b50822d60d9d6f8dc25f43a1052f570118c7deab86f5edccf73 Miraielf mirai ua-wget
http://202.1.31.174/johenlastgen/johen.mips1b9d6b20838cf34022d891984d6714b49825b06fac1e16c842d07baf3efb277a Miraielf mirai ua-wget
http://202.1.31.174/johenlastgen/johen.arcd384816ab8fbbd2da4f8ef21ecde8b5054605eb0e39bfa1ec8a7287d771bc319 Miraielf mirai ua-wget
http://202.1.31.174/johenlastgen/johen.i468n/an/aelf ua-wget
http://202.1.31.174/johenlastgen/johen.i686719aae37a038b5f0699c7cb07c9088a5a398e5c96e3365149c94e35edb1aab10 Miraielf mirai ua-wget
http://202.1.31.174/johenlastgen/johen.x86_6476c88be27a69fe4878379414d17f9d6f1a9f3887c7eb27043b80093227eb136a Miraielf mirai ua-wget
http://202.1.31.174/johenlastgen/johen.mpsl77cb54840a32f1361a7007f821183a9d90fcbb992471b812f3fff477872bcfad Miraielf mirai ua-wget
http://202.1.31.174/johenlastgen/johen.arm9a5b41814e1a4caf5c42ae7622316ed49dc10060ab189f68fa33ef4ac459abe2 Miraielf mirai ua-wget
http://202.1.31.174/johenlastgen/johen.arm5575b2bfeea9646417fb699b0a24f7b574ed1232e6b7431fd1b67976fc8362836 Miraielf mirai ua-wget
http://202.1.31.174/johenlastgen/johen.arm67b14ac75bcacfe95ade13a12038b6264418f30b70a680c7ee624b71aff292adf Miraielf mirai ua-wget
http://202.1.31.174/johenlastgen/johen.arm762ff185e913511632d011c0fe7381e46a7ac2a0acfe1e1065f7263f0aa9f05a5 Miraielf mirai ua-wget
http://202.1.31.174/johenlastgen/johen.ppc593d5a0d6d616bb94d26292330c33f890a3e56a795d5cd9dd3f7d6542a07fcc8 Miraielf mirai ua-wget
http://202.1.31.174/johenlastgen/johen.spc706933b63a14eaa535e84a565b76dbceacab6a0c413b966c7828d8980e2fb847 Miraielf mirai ua-wget
http://202.1.31.174/johenlastgen/johen.m68k50bc3dd71f99c5dcbd6b9c4aa246e4f5ab108379416a5283cee28ee916236e6a Miraielf mirai ua-wget
http://202.1.31.174/johenlastgen/johen.sh449d6e0777fea7282626bc493c39e7872a285511033edbe4cb6ccc2b5058ca73f Miraielf mirai ua-wget

Intelligence


File Origin
# of uploads :
1
# of downloads :
53
Origin country :
DE DE
Vendor Threat Intelligence
No detections
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
busybox evasive medusa mirai
Result
Gathering data
Verdict:
Malicious
File Type:
unix shell
First seen:
2026-01-11T05:17:00Z UTC
Last seen:
2026-01-12T18:54:00Z UTC
Hits:
~10
Detections:
HEUR:Trojan-Downloader.Shell.Agent.p HEUR:Trojan-Downloader.Shell.Agent.gen HEUR:Trojan-Downloader.Shell.Agent.a
Status:
terminated
Behavior Graph:
%3 guuid=f047eb57-1900-0000-4e0a-19c764140000 pid=5220 /usr/bin/sudo guuid=9527115b-1900-0000-4e0a-19c765140000 pid=5221 /tmp/sample.bin guuid=f047eb57-1900-0000-4e0a-19c764140000 pid=5220->guuid=9527115b-1900-0000-4e0a-19c765140000 pid=5221 execve guuid=9cc6d75b-1900-0000-4e0a-19c766140000 pid=5222 /usr/bin/cp guuid=9527115b-1900-0000-4e0a-19c765140000 pid=5221->guuid=9cc6d75b-1900-0000-4e0a-19c766140000 pid=5222 execve guuid=63d57b62-1900-0000-4e0a-19c767140000 pid=5223 /usr/bin/wget net send-data write-file guuid=9527115b-1900-0000-4e0a-19c765140000 pid=5221->guuid=63d57b62-1900-0000-4e0a-19c767140000 pid=5223 execve guuid=ffe37014-1c00-0000-4e0a-19c78f140000 pid=5263 /usr/bin/curl net send-data write-file guuid=9527115b-1900-0000-4e0a-19c765140000 pid=5221->guuid=ffe37014-1c00-0000-4e0a-19c78f140000 pid=5263 execve guuid=fbae993b-1c00-0000-4e0a-19c790140000 pid=5264 /usr/bin/chmod guuid=9527115b-1900-0000-4e0a-19c765140000 pid=5221->guuid=fbae993b-1c00-0000-4e0a-19c790140000 pid=5264 execve guuid=7244313c-1c00-0000-4e0a-19c791140000 pid=5265 /tmp/johen.x86 net guuid=9527115b-1900-0000-4e0a-19c765140000 pid=5221->guuid=7244313c-1c00-0000-4e0a-19c791140000 pid=5265 execve guuid=c820956a-1d00-0000-4e0a-19c797140000 pid=5271 /usr/bin/rm delete-file guuid=9527115b-1900-0000-4e0a-19c765140000 pid=5221->guuid=c820956a-1d00-0000-4e0a-19c797140000 pid=5271 execve guuid=9554256b-1d00-0000-4e0a-19c798140000 pid=5272 /usr/bin/wget net send-data write-file guuid=9527115b-1900-0000-4e0a-19c765140000 pid=5221->guuid=9554256b-1d00-0000-4e0a-19c798140000 pid=5272 execve guuid=d6b320bf-1d00-0000-4e0a-19c799140000 pid=5273 /usr/bin/curl net send-data write-file guuid=9527115b-1900-0000-4e0a-19c765140000 pid=5221->guuid=d6b320bf-1d00-0000-4e0a-19c799140000 pid=5273 execve guuid=34cd4bec-1e00-0000-4e0a-19c79a140000 pid=5274 /usr/bin/chmod guuid=9527115b-1900-0000-4e0a-19c765140000 pid=5221->guuid=34cd4bec-1e00-0000-4e0a-19c79a140000 pid=5274 execve guuid=cf7a29ed-1e00-0000-4e0a-19c79b140000 pid=5275 /usr/bin/bash guuid=9527115b-1900-0000-4e0a-19c765140000 pid=5221->guuid=cf7a29ed-1e00-0000-4e0a-19c79b140000 pid=5275 clone guuid=d1a556ee-1e00-0000-4e0a-19c79d140000 pid=5277 /usr/bin/rm delete-file guuid=9527115b-1900-0000-4e0a-19c765140000 pid=5221->guuid=d1a556ee-1e00-0000-4e0a-19c79d140000 pid=5277 execve guuid=0437efee-1e00-0000-4e0a-19c79e140000 pid=5278 /usr/bin/wget net send-data write-file guuid=9527115b-1900-0000-4e0a-19c765140000 pid=5221->guuid=0437efee-1e00-0000-4e0a-19c79e140000 pid=5278 execve guuid=fa519321-1f00-0000-4e0a-19c79f140000 pid=5279 /usr/bin/curl net send-data write-file guuid=9527115b-1900-0000-4e0a-19c765140000 pid=5221->guuid=fa519321-1f00-0000-4e0a-19c79f140000 pid=5279 execve guuid=5b8d4e55-1f00-0000-4e0a-19c7a0140000 pid=5280 /usr/bin/chmod guuid=9527115b-1900-0000-4e0a-19c765140000 pid=5221->guuid=5b8d4e55-1f00-0000-4e0a-19c7a0140000 pid=5280 execve guuid=a6a79355-1f00-0000-4e0a-19c7a1140000 pid=5281 /usr/bin/bash guuid=9527115b-1900-0000-4e0a-19c765140000 pid=5221->guuid=a6a79355-1f00-0000-4e0a-19c7a1140000 pid=5281 clone guuid=425f3056-1f00-0000-4e0a-19c7a3140000 pid=5283 /usr/bin/rm delete-file guuid=9527115b-1900-0000-4e0a-19c765140000 pid=5221->guuid=425f3056-1f00-0000-4e0a-19c7a3140000 pid=5283 execve guuid=f3b47456-1f00-0000-4e0a-19c7a4140000 pid=5284 /usr/bin/wget net send-data guuid=9527115b-1900-0000-4e0a-19c765140000 pid=5221->guuid=f3b47456-1f00-0000-4e0a-19c7a4140000 pid=5284 execve guuid=24ac9b6a-1f00-0000-4e0a-19c7a5140000 pid=5285 /usr/bin/curl net send-data write-file guuid=9527115b-1900-0000-4e0a-19c765140000 pid=5221->guuid=24ac9b6a-1f00-0000-4e0a-19c7a5140000 pid=5285 execve guuid=8e26a47f-1f00-0000-4e0a-19c7a6140000 pid=5286 /usr/bin/chmod guuid=9527115b-1900-0000-4e0a-19c765140000 pid=5221->guuid=8e26a47f-1f00-0000-4e0a-19c7a6140000 pid=5286 execve guuid=58eeef7f-1f00-0000-4e0a-19c7a7140000 pid=5287 /usr/bin/bash guuid=9527115b-1900-0000-4e0a-19c765140000 pid=5221->guuid=58eeef7f-1f00-0000-4e0a-19c7a7140000 pid=5287 clone guuid=1b071880-1f00-0000-4e0a-19c7a8140000 pid=5288 /usr/bin/rm delete-file guuid=9527115b-1900-0000-4e0a-19c765140000 pid=5221->guuid=1b071880-1f00-0000-4e0a-19c7a8140000 pid=5288 execve guuid=8a956b80-1f00-0000-4e0a-19c7a9140000 pid=5289 /usr/bin/wget net send-data write-file guuid=9527115b-1900-0000-4e0a-19c765140000 pid=5221->guuid=8a956b80-1f00-0000-4e0a-19c7a9140000 pid=5289 execve guuid=50543d9e-1f00-0000-4e0a-19c7aa140000 pid=5290 /usr/bin/curl net send-data write-file guuid=9527115b-1900-0000-4e0a-19c765140000 pid=5221->guuid=50543d9e-1f00-0000-4e0a-19c7aa140000 pid=5290 execve guuid=a7ee61bd-1f00-0000-4e0a-19c7ab140000 pid=5291 /usr/bin/chmod guuid=9527115b-1900-0000-4e0a-19c765140000 pid=5221->guuid=a7ee61bd-1f00-0000-4e0a-19c7ab140000 pid=5291 execve guuid=ca11afbd-1f00-0000-4e0a-19c7ac140000 pid=5292 /tmp/johen.i686 net guuid=9527115b-1900-0000-4e0a-19c765140000 pid=5221->guuid=ca11afbd-1f00-0000-4e0a-19c7ac140000 pid=5292 execve guuid=b95d26ea-2000-0000-4e0a-19c7b2140000 pid=5298 /usr/bin/rm delete-file guuid=9527115b-1900-0000-4e0a-19c765140000 pid=5221->guuid=b95d26ea-2000-0000-4e0a-19c7b2140000 pid=5298 execve guuid=00d273ea-2000-0000-4e0a-19c7b3140000 pid=5299 /usr/bin/wget net send-data write-file guuid=9527115b-1900-0000-4e0a-19c765140000 pid=5221->guuid=00d273ea-2000-0000-4e0a-19c7b3140000 pid=5299 execve guuid=3d6cd83f-2100-0000-4e0a-19c7b4140000 pid=5300 /usr/bin/curl net send-data write-file guuid=9527115b-1900-0000-4e0a-19c765140000 pid=5221->guuid=3d6cd83f-2100-0000-4e0a-19c7b4140000 pid=5300 execve guuid=8f09cb32-2500-0000-4e0a-19c7b5140000 pid=5301 /usr/bin/chmod guuid=9527115b-1900-0000-4e0a-19c765140000 pid=5221->guuid=8f09cb32-2500-0000-4e0a-19c7b5140000 pid=5301 execve guuid=f32f5c33-2500-0000-4e0a-19c7b6140000 pid=5302 /tmp/johen.x86_64 mprotect-exec net guuid=9527115b-1900-0000-4e0a-19c765140000 pid=5221->guuid=f32f5c33-2500-0000-4e0a-19c7b6140000 pid=5302 execve guuid=8ff7295f-2600-0000-4e0a-19c7bc140000 pid=5308 /usr/bin/rm delete-file guuid=9527115b-1900-0000-4e0a-19c765140000 pid=5221->guuid=8ff7295f-2600-0000-4e0a-19c7bc140000 pid=5308 execve guuid=7609c25f-2600-0000-4e0a-19c7bd140000 pid=5309 /usr/bin/wget guuid=9527115b-1900-0000-4e0a-19c765140000 pid=5221->guuid=7609c25f-2600-0000-4e0a-19c7bd140000 pid=5309 execve a35fb3b0-0dd0-563d-8f10-388cbbaf5a13 202.1.31.174:80 guuid=63d57b62-1900-0000-4e0a-19c767140000 pid=5223->a35fb3b0-0dd0-563d-8f10-388cbbaf5a13 send: 149B guuid=ffe37014-1c00-0000-4e0a-19c78f140000 pid=5263->a35fb3b0-0dd0-563d-8f10-388cbbaf5a13 send: 98B 8b0a01dc-0728-52c1-8024-c4ba7801b8d6 8.8.8.8:53 guuid=7244313c-1c00-0000-4e0a-19c791140000 pid=5265->8b0a01dc-0728-52c1-8024-c4ba7801b8d6 con guuid=09e43e3d-1c00-0000-4e0a-19c792140000 pid=5266 /tmp/johen.x86 guuid=7244313c-1c00-0000-4e0a-19c791140000 pid=5265->guuid=09e43e3d-1c00-0000-4e0a-19c792140000 pid=5266 clone guuid=7d14726a-1d00-0000-4e0a-19c795140000 pid=5269 /tmp/johen.x86 guuid=7244313c-1c00-0000-4e0a-19c791140000 pid=5265->guuid=7d14726a-1d00-0000-4e0a-19c795140000 pid=5269 clone guuid=5c98816a-1d00-0000-4e0a-19c796140000 pid=5270 /tmp/johen.x86 net send-data zombie guuid=7244313c-1c00-0000-4e0a-19c791140000 pid=5265->guuid=5c98816a-1d00-0000-4e0a-19c796140000 pid=5270 clone guuid=c5294c3d-1c00-0000-4e0a-19c793140000 pid=5267 /tmp/johen.x86 guuid=09e43e3d-1c00-0000-4e0a-19c792140000 pid=5266->guuid=c5294c3d-1c00-0000-4e0a-19c793140000 pid=5267 clone guuid=2bbc5a3d-1c00-0000-4e0a-19c794140000 pid=5268 /tmp/johen.x86 dns net send-data zombie guuid=09e43e3d-1c00-0000-4e0a-19c792140000 pid=5266->guuid=2bbc5a3d-1c00-0000-4e0a-19c794140000 pid=5268 clone guuid=2bbc5a3d-1c00-0000-4e0a-19c794140000 pid=5268->8b0a01dc-0728-52c1-8024-c4ba7801b8d6 send: 40B 73140e95-4076-59b4-a56d-726394bb043d botnet.rehannnap.my.id:69 guuid=2bbc5a3d-1c00-0000-4e0a-19c794140000 pid=5268->73140e95-4076-59b4-a56d-726394bb043d send: 17B guuid=5c98816a-1d00-0000-4e0a-19c796140000 pid=5270->8b0a01dc-0728-52c1-8024-c4ba7801b8d6 send: 800B 310a0ed0-c544-54ca-bf3f-fca55e459297 65.222.202.53:80 guuid=5c98816a-1d00-0000-4e0a-19c796140000 pid=5270->310a0ed0-c544-54ca-bf3f-fca55e459297 send: 2B 374fe992-c701-5863-b3d0-3edab79486ce botnet.rehannnap.my.id:80 guuid=9554256b-1d00-0000-4e0a-19c798140000 pid=5272->374fe992-c701-5863-b3d0-3edab79486ce send: 150B guuid=d6b320bf-1d00-0000-4e0a-19c799140000 pid=5273->374fe992-c701-5863-b3d0-3edab79486ce send: 99B guuid=0437efee-1e00-0000-4e0a-19c79e140000 pid=5278->374fe992-c701-5863-b3d0-3edab79486ce send: 149B guuid=fa519321-1f00-0000-4e0a-19c79f140000 pid=5279->374fe992-c701-5863-b3d0-3edab79486ce send: 98B guuid=f3b47456-1f00-0000-4e0a-19c7a4140000 pid=5284->374fe992-c701-5863-b3d0-3edab79486ce send: 150B guuid=24ac9b6a-1f00-0000-4e0a-19c7a5140000 pid=5285->374fe992-c701-5863-b3d0-3edab79486ce send: 99B guuid=8a956b80-1f00-0000-4e0a-19c7a9140000 pid=5289->374fe992-c701-5863-b3d0-3edab79486ce send: 150B guuid=50543d9e-1f00-0000-4e0a-19c7aa140000 pid=5290->374fe992-c701-5863-b3d0-3edab79486ce send: 99B guuid=ca11afbd-1f00-0000-4e0a-19c7ac140000 pid=5292->8b0a01dc-0728-52c1-8024-c4ba7801b8d6 con guuid=29a133be-1f00-0000-4e0a-19c7ad140000 pid=5293 /tmp/johen.i686 guuid=ca11afbd-1f00-0000-4e0a-19c7ac140000 pid=5292->guuid=29a133be-1f00-0000-4e0a-19c7ad140000 pid=5293 clone guuid=6b2913ea-2000-0000-4e0a-19c7b0140000 pid=5296 /tmp/johen.i686 guuid=ca11afbd-1f00-0000-4e0a-19c7ac140000 pid=5292->guuid=6b2913ea-2000-0000-4e0a-19c7b0140000 pid=5296 clone guuid=ffdf18ea-2000-0000-4e0a-19c7b1140000 pid=5297 /tmp/johen.i686 net send-data zombie guuid=ca11afbd-1f00-0000-4e0a-19c7ac140000 pid=5292->guuid=ffdf18ea-2000-0000-4e0a-19c7b1140000 pid=5297 clone guuid=f4d738be-1f00-0000-4e0a-19c7ae140000 pid=5294 /tmp/johen.i686 guuid=29a133be-1f00-0000-4e0a-19c7ad140000 pid=5293->guuid=f4d738be-1f00-0000-4e0a-19c7ae140000 pid=5294 clone guuid=d6523dbe-1f00-0000-4e0a-19c7af140000 pid=5295 /tmp/johen.i686 dns net send-data zombie guuid=29a133be-1f00-0000-4e0a-19c7ad140000 pid=5293->guuid=d6523dbe-1f00-0000-4e0a-19c7af140000 pid=5295 clone guuid=d6523dbe-1f00-0000-4e0a-19c7af140000 pid=5295->8b0a01dc-0728-52c1-8024-c4ba7801b8d6 send: 40B guuid=d6523dbe-1f00-0000-4e0a-19c7af140000 pid=5295->73140e95-4076-59b4-a56d-726394bb043d send: 18B guuid=ffdf18ea-2000-0000-4e0a-19c7b1140000 pid=5297->8b0a01dc-0728-52c1-8024-c4ba7801b8d6 send: 600B guuid=ffdf18ea-2000-0000-4e0a-19c7b1140000 pid=5297->310a0ed0-c544-54ca-bf3f-fca55e459297 send: 2B guuid=00d273ea-2000-0000-4e0a-19c7b3140000 pid=5299->374fe992-c701-5863-b3d0-3edab79486ce send: 152B guuid=3d6cd83f-2100-0000-4e0a-19c7b4140000 pid=5300->374fe992-c701-5863-b3d0-3edab79486ce send: 101B guuid=f32f5c33-2500-0000-4e0a-19c7b6140000 pid=5302->8b0a01dc-0728-52c1-8024-c4ba7801b8d6 con guuid=a3653f34-2500-0000-4e0a-19c7b7140000 pid=5303 /tmp/johen.x86_64 guuid=f32f5c33-2500-0000-4e0a-19c7b6140000 pid=5302->guuid=a3653f34-2500-0000-4e0a-19c7b7140000 pid=5303 clone guuid=1552065f-2600-0000-4e0a-19c7ba140000 pid=5306 /tmp/johen.x86_64 guuid=f32f5c33-2500-0000-4e0a-19c7b6140000 pid=5302->guuid=1552065f-2600-0000-4e0a-19c7ba140000 pid=5306 clone guuid=d2a7105f-2600-0000-4e0a-19c7bb140000 pid=5307 /tmp/johen.x86_64 net send-data zombie guuid=f32f5c33-2500-0000-4e0a-19c7b6140000 pid=5302->guuid=d2a7105f-2600-0000-4e0a-19c7bb140000 pid=5307 clone guuid=25d84a34-2500-0000-4e0a-19c7b8140000 pid=5304 /tmp/johen.x86_64 guuid=a3653f34-2500-0000-4e0a-19c7b7140000 pid=5303->guuid=25d84a34-2500-0000-4e0a-19c7b8140000 pid=5304 clone guuid=0a8f5234-2500-0000-4e0a-19c7b9140000 pid=5305 /tmp/johen.x86_64 net send-data zombie guuid=a3653f34-2500-0000-4e0a-19c7b7140000 pid=5303->guuid=0a8f5234-2500-0000-4e0a-19c7b9140000 pid=5305 clone guuid=0a8f5234-2500-0000-4e0a-19c7b9140000 pid=5305->8b0a01dc-0728-52c1-8024-c4ba7801b8d6 send: 205B guuid=0a8f5234-2500-0000-4e0a-19c7b9140000 pid=5305->310a0ed0-c544-54ca-bf3f-fca55e459297 con guuid=d2a7105f-2600-0000-4e0a-19c7bb140000 pid=5307->8b0a01dc-0728-52c1-8024-c4ba7801b8d6 send: 205B guuid=d2a7105f-2600-0000-4e0a-19c7bb140000 pid=5307->310a0ed0-c544-54ca-bf3f-fca55e459297 con
Threat name:
Linux.Downloader.Medusa
Status:
Malicious
First seen:
2026-01-11 10:13:16 UTC
File Type:
Text (Shell)
AV detection:
21 of 38 (55.26%)
Threat level:
  3/5
Result
Malware family:
Score:
  10/10
Tags:
family:mirai antivm botnet defense_evasion discovery linux upx
Behaviour
Reads runtime system information
System Network Configuration Discovery
Writes file to tmp directory
Checks CPU configuration
UPX packed file
Enumerates running processes
Writes file to system bin folder
File and Directory Permissions Modification
Executes dropped EXE
Modifies Watchdog functionality
Mirai
Mirai family
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Linux_Shellscript_Downloader
Author:albertzsigovits
Description:Generic Approach to Shellscript downloaders
Rule name:MAL_Linux_IoT_MultiArch_BotnetLoader_Generic
Author:Anish Bogati
Description:Technique-based detection of IoT/Linux botnet loader shell scripts downloading binaries from numeric IPs, chmodding, and executing multi-architecture payloads
Reference:MalwareBazaar sample lilin.sh

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh 1fdd5aec31db9c85e82047efe44201b51dc0fbcce280e5e8b2740310bf7f0095

(this sample)

  
Delivery method
Distributed via web download

Comments