MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 23c0fff88fda9fb91c9dcc47a37d51696423ee775742e598c62a5585e6f4cff6. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 7


Intelligence 7 IOCs YARA 1 File information Comments

SHA256 hash: 23c0fff88fda9fb91c9dcc47a37d51696423ee775742e598c62a5585e6f4cff6
SHA3-384 hash: 553c72c62f42a83d926afe449bd3269bcff8f98e44aba100ef98b5a3365a76f950776f1c0f2d79a99df68f4cb84812a5
SHA1 hash: b0c46efaa2c9c13b04687ded8f6c97f35b24441c
MD5 hash: 2ff9d31110cea044f2ccdccc38b92b68
humanhash: nebraska-vermont-queen-blossom
File name:t.sh
Download: download sample
Signature Mirai
File size:351 bytes
First seen:2026-04-04 06:20:48 UTC
Last seen:Never
File type: sh
MIME type:text/plain
ssdeep 6:PXr9UCuyU4IUZXr9Uh0yU1BFIUAK+Xr9U4LyU4IIU4hPXr9UeGLyUeGIIUeGhkn:JDIyHFIjVnIdedIIeu
TLSH T1B6E09ADDB0B928A8FC00BE4378D18F946141F29B6E9B4F49584C1E61ED86AB4303AB84
Magika txt
Reporter abuse_ch
Tags:sh
URLMalware sample (SHA256 hash)SignatureTags
http://5.175.223.249/data.mipsd468b6ada8e3dcbfa91c708de4fe1ca3e41bbe18b2f5af2054a2e0a5686fdc9d Miraimirai
http://5.175.223.249/data.mipselaabe3c75c74611484aae5f13ec6212a348df01d223d4c2d2a7d77a306486c1d8 Miraimirai
http://5.175.223.249/data.mips-uclibcb4fb9c7262d93538464cb8f92c2ae3fbc16e7dd96d92badcb87cec1aed08be05 Miraimirai
http://5.175.223.249/data.mipsel-uclibc15588e148ce17c6225ffdccad499ddb5adcf931f189355f600e54d861f6992ae Miraimirai

Intelligence


File Origin
# of uploads :
1
# of downloads :
42
Origin country :
DE DE
Vendor Threat Intelligence
Gathering data
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
mirai
Verdict:
Malicious
File Type:
text
First seen:
2026-04-04T03:25:00Z UTC
Last seen:
2026-04-04T03:37:00Z UTC
Hits:
~10
Detections:
HEUR:Trojan-Downloader.Shell.Agent.a
Status:
terminated
Behavior Graph:
%3 guuid=feeec157-1900-0000-1425-acd92b140000 pid=5163 /usr/bin/sudo guuid=a35af55a-1900-0000-1425-acd92c140000 pid=5164 /tmp/sample.bin guuid=feeec157-1900-0000-1425-acd92b140000 pid=5163->guuid=a35af55a-1900-0000-1425-acd92c140000 pid=5164 execve guuid=c83e4f5b-1900-0000-1425-acd92d140000 pid=5165 /usr/bin/dash guuid=a35af55a-1900-0000-1425-acd92c140000 pid=5164->guuid=c83e4f5b-1900-0000-1425-acd92d140000 pid=5165 clone guuid=0b6c5e5b-1900-0000-1425-acd92e140000 pid=5166 /usr/bin/chmod guuid=a35af55a-1900-0000-1425-acd92c140000 pid=5164->guuid=0b6c5e5b-1900-0000-1425-acd92e140000 pid=5166 execve guuid=7532e65b-1900-0000-1425-acd92f140000 pid=5167 /usr/bin/dash guuid=a35af55a-1900-0000-1425-acd92c140000 pid=5164->guuid=7532e65b-1900-0000-1425-acd92f140000 pid=5167 clone guuid=20dced5b-1900-0000-1425-acd930140000 pid=5168 /usr/bin/dash guuid=a35af55a-1900-0000-1425-acd92c140000 pid=5164->guuid=20dced5b-1900-0000-1425-acd930140000 pid=5168 clone guuid=30c8f45b-1900-0000-1425-acd931140000 pid=5169 /usr/bin/chmod guuid=a35af55a-1900-0000-1425-acd92c140000 pid=5164->guuid=30c8f45b-1900-0000-1425-acd931140000 pid=5169 execve guuid=f9e0325c-1900-0000-1425-acd932140000 pid=5170 /usr/bin/dash guuid=a35af55a-1900-0000-1425-acd92c140000 pid=5164->guuid=f9e0325c-1900-0000-1425-acd932140000 pid=5170 clone guuid=22e4375c-1900-0000-1425-acd933140000 pid=5171 /usr/bin/dash guuid=a35af55a-1900-0000-1425-acd92c140000 pid=5164->guuid=22e4375c-1900-0000-1425-acd933140000 pid=5171 clone guuid=ea3d3d5c-1900-0000-1425-acd934140000 pid=5172 /usr/bin/chmod guuid=a35af55a-1900-0000-1425-acd92c140000 pid=5164->guuid=ea3d3d5c-1900-0000-1425-acd934140000 pid=5172 execve guuid=09217a5c-1900-0000-1425-acd935140000 pid=5173 /usr/bin/dash guuid=a35af55a-1900-0000-1425-acd92c140000 pid=5164->guuid=09217a5c-1900-0000-1425-acd935140000 pid=5173 clone guuid=db5f815c-1900-0000-1425-acd936140000 pid=5174 /usr/bin/dash guuid=a35af55a-1900-0000-1425-acd92c140000 pid=5164->guuid=db5f815c-1900-0000-1425-acd936140000 pid=5174 clone guuid=9eb4875c-1900-0000-1425-acd937140000 pid=5175 /usr/bin/chmod guuid=a35af55a-1900-0000-1425-acd92c140000 pid=5164->guuid=9eb4875c-1900-0000-1425-acd937140000 pid=5175 execve guuid=01acc25c-1900-0000-1425-acd938140000 pid=5176 /usr/bin/dash guuid=a35af55a-1900-0000-1425-acd92c140000 pid=5164->guuid=01acc25c-1900-0000-1425-acd938140000 pid=5176 clone guuid=b6f1ca5c-1900-0000-1425-acd939140000 pid=5177 /usr/bin/rm delete-file guuid=a35af55a-1900-0000-1425-acd92c140000 pid=5164->guuid=b6f1ca5c-1900-0000-1425-acd939140000 pid=5177 execve
Verdict:
Malicious
Threat:
Trojan-Downloader.Shell.Agent
Threat name:
Document-HTML.Downloader.Heuristic
Status:
Malicious
First seen:
2026-04-04 06:21:30 UTC
File Type:
Text (Shell)
AV detection:
6 of 36 (16.67%)
Threat level:
  2/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Modifies registry class
Suspicious use of SetWindowsHookEx
Enumerates physical storage devices
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:MAL_Linux_IoT_MultiArch_BotnetLoader_Generic
Author:Anish Bogati
Description:Technique-based detection of IoT/Linux botnet loader shell scripts downloading binaries from numeric IPs, chmodding, and executing multi-architecture payloads
Reference:MalwareBazaar sample lilin.sh

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh 23c0fff88fda9fb91c9dcc47a37d51696423ee775742e598c62a5585e6f4cff6

(this sample)

  
Delivery method
Distributed via web download

Comments