MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 24d0d3d9346bc42fc669ab17c3b0cd7cb7fd5b04587842eccdecd40309eb7fd7. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 6


Intelligence 6 IOCs YARA 1 File information Comments

SHA256 hash: 24d0d3d9346bc42fc669ab17c3b0cd7cb7fd5b04587842eccdecd40309eb7fd7
SHA3-384 hash: ed8306a0df74b70a6c43586f86e087469d0560ac8ae6ec51bde85422f9173655045a6f73f2f7ddb34da1616b9e66ee02
SHA1 hash: 85d59627014366e8ea595d37d5659bb01557784c
MD5 hash: bb283d5e3cbb8a5c9dde2b06e8efc213
humanhash: florida-speaker-nine-romeo
File name:w.sh
Download: download sample
File size:943 bytes
First seen:2026-04-01 05:51:31 UTC
Last seen:Never
File type: sh
MIME type:text/x-shellscript
ssdeep 12:KzFEkUfEEFKNI5rEy3cKrEj+kafaE+oDI/DrHFIgnIqVedIIeIBc/wWI9KI7XU:MNIOKPkAGoUbrSgI8Ehc/Z+U
TLSH T19511B1DD70A9245DAC119E4270918DA0A145F2FF7DA79F48AC884DB1F58BBB4302DB85
TrID 70.0% (.SH) Linux/UNIX shell script (7000/1)
30.0% (.) Unix-like shebang (var.3) (gen) (3000/1)
Magika shell
Reporter adliwahid
URLMalware sample (SHA256 hash)SignatureTags
http://5.175.223.249/data.arm45c88d830c55a5d9cf20e9dfec55d0b3def1037d478c44fca159512b5599c3aaa Miraimirai
http://5.175.223.249/data.arm504f0c5f71d4b934159b2bf2d8e13862a032a910704f5596422e5161b9181ee8d Miraimirai
http://5.175.223.249/data.arm637c9c694f3fa721f213069d5ab032bb6c3772f41ed6e91c7525a4e1aa5abd7c3 Miraimirai
http://5.175.223.249/data.arm75ba17425e52ed385298524a49a8a12e8b69b0d28df79311f4ef20c9db7810dcd Miraimirai
http://5.175.223.249/data.aarch64e561415a538e1a064a0efc1bfccc637340702eb6f05a34a965e14ca1ae0b3d0c Miraimirai
http://5.175.223.249/data.mips03439a4f19441041a4e6a7ca4194e89c3abdabf119f5f60e753794aa937582a3 Miraimirai
http://5.175.223.249/data.mipselb6e16730d6d3ef3922e0a41f3e8c972ea1685baa08263b57c2664883e81a244a Miraimirai
http://5.175.223.249/data.mips-uclibcb4fb9c7262d93538464cb8f92c2ae3fbc16e7dd96d92badcb87cec1aed08be05 Miraimirai
http://5.175.223.249/data.mipsel-uclibc04c81f45441c3a817bb5e655abf3b48768e1b175c68945b9cc4e9b461429c806 Miraimirai
http://5.175.223.249/data.powerpc22609df256833834d36c6d61e263fa78b6d625c05faf1460c289ff971b8e1e31 Miraimirai
http://5.175.223.249/data.x86cfe30f2b3a18b72405c7e982aae6fd2f272a5e4fbd6703674715bd050b6de296 Miraimirai
http://5.175.223.249/data.x86_64505d429c30920de8738ec53459ffe674a47554091c6c0a45d0076d456c1407db DDoSAgentDDoSAgent

Intelligence


File Origin
# of uploads :
1
# of downloads :
58
Origin country :
NL NL
Vendor Threat Intelligence
Gathering data
Verdict:
Malicious
File Type:
unix shell
First seen:
2026-03-31T00:54:00Z UTC
Last seen:
2026-03-31T01:28:00Z UTC
Hits:
~10
Detections:
HEUR:Trojan-Downloader.Shell.Agent.gen HEUR:Trojan-Downloader.Shell.Agent.a
Status:
terminated
Behavior Graph:
%3 guuid=e52d8f17-2100-0000-2f64-091b6f050000 pid=1391 /usr/bin/sudo guuid=6d358d19-2100-0000-2f64-091b74050000 pid=1396 /tmp/sample.bin guuid=e52d8f17-2100-0000-2f64-091b6f050000 pid=1391->guuid=6d358d19-2100-0000-2f64-091b74050000 pid=1396 execve guuid=823bcb19-2100-0000-2f64-091b76050000 pid=1398 /usr/bin/wget net send-data write-file guuid=6d358d19-2100-0000-2f64-091b74050000 pid=1396->guuid=823bcb19-2100-0000-2f64-091b76050000 pid=1398 execve guuid=5af3ef26-2100-0000-2f64-091b8e050000 pid=1422 /usr/bin/chmod guuid=6d358d19-2100-0000-2f64-091b74050000 pid=1396->guuid=5af3ef26-2100-0000-2f64-091b8e050000 pid=1422 execve guuid=aa965c27-2100-0000-2f64-091b8f050000 pid=1423 /usr/bin/dash guuid=6d358d19-2100-0000-2f64-091b74050000 pid=1396->guuid=aa965c27-2100-0000-2f64-091b8f050000 pid=1423 clone guuid=bf300d28-2100-0000-2f64-091b92050000 pid=1426 /usr/bin/wget net send-data write-file guuid=6d358d19-2100-0000-2f64-091b74050000 pid=1396->guuid=bf300d28-2100-0000-2f64-091b92050000 pid=1426 execve guuid=1ff52e33-2100-0000-2f64-091bad050000 pid=1453 /usr/bin/chmod guuid=6d358d19-2100-0000-2f64-091b74050000 pid=1396->guuid=1ff52e33-2100-0000-2f64-091bad050000 pid=1453 execve guuid=e6c76c33-2100-0000-2f64-091bae050000 pid=1454 /usr/bin/dash guuid=6d358d19-2100-0000-2f64-091b74050000 pid=1396->guuid=e6c76c33-2100-0000-2f64-091bae050000 pid=1454 clone guuid=aa9e0934-2100-0000-2f64-091bb2050000 pid=1458 /usr/bin/wget net send-data write-file guuid=6d358d19-2100-0000-2f64-091b74050000 pid=1396->guuid=aa9e0934-2100-0000-2f64-091bb2050000 pid=1458 execve guuid=7e10ce3f-2100-0000-2f64-091bc7050000 pid=1479 /usr/bin/chmod guuid=6d358d19-2100-0000-2f64-091b74050000 pid=1396->guuid=7e10ce3f-2100-0000-2f64-091bc7050000 pid=1479 execve guuid=694f1840-2100-0000-2f64-091bc9050000 pid=1481 /usr/bin/dash guuid=6d358d19-2100-0000-2f64-091b74050000 pid=1396->guuid=694f1840-2100-0000-2f64-091bc9050000 pid=1481 clone guuid=78a0a940-2100-0000-2f64-091bcc050000 pid=1484 /usr/bin/wget net send-data write-file guuid=6d358d19-2100-0000-2f64-091b74050000 pid=1396->guuid=78a0a940-2100-0000-2f64-091bcc050000 pid=1484 execve guuid=9f13334c-2100-0000-2f64-091be7050000 pid=1511 /usr/bin/chmod guuid=6d358d19-2100-0000-2f64-091b74050000 pid=1396->guuid=9f13334c-2100-0000-2f64-091be7050000 pid=1511 execve guuid=542f714c-2100-0000-2f64-091be9050000 pid=1513 /usr/bin/dash guuid=6d358d19-2100-0000-2f64-091b74050000 pid=1396->guuid=542f714c-2100-0000-2f64-091be9050000 pid=1513 clone guuid=7a11f34c-2100-0000-2f64-091bec050000 pid=1516 /usr/bin/wget net send-data write-file guuid=6d358d19-2100-0000-2f64-091b74050000 pid=1396->guuid=7a11f34c-2100-0000-2f64-091bec050000 pid=1516 execve guuid=4381015a-2100-0000-2f64-091b0f060000 pid=1551 /usr/bin/chmod guuid=6d358d19-2100-0000-2f64-091b74050000 pid=1396->guuid=4381015a-2100-0000-2f64-091b0f060000 pid=1551 execve guuid=a88f495a-2100-0000-2f64-091b10060000 pid=1552 /usr/bin/dash guuid=6d358d19-2100-0000-2f64-091b74050000 pid=1396->guuid=a88f495a-2100-0000-2f64-091b10060000 pid=1552 clone guuid=37ae0a5b-2100-0000-2f64-091b14060000 pid=1556 /usr/bin/wget net send-data write-file guuid=6d358d19-2100-0000-2f64-091b74050000 pid=1396->guuid=37ae0a5b-2100-0000-2f64-091b14060000 pid=1556 execve guuid=70df5966-2100-0000-2f64-091b2f060000 pid=1583 /usr/bin/chmod guuid=6d358d19-2100-0000-2f64-091b74050000 pid=1396->guuid=70df5966-2100-0000-2f64-091b2f060000 pid=1583 execve guuid=29b4aa66-2100-0000-2f64-091b31060000 pid=1585 /usr/bin/dash guuid=6d358d19-2100-0000-2f64-091b74050000 pid=1396->guuid=29b4aa66-2100-0000-2f64-091b31060000 pid=1585 clone guuid=c399f867-2100-0000-2f64-091b36060000 pid=1590 /usr/bin/wget net send-data write-file guuid=6d358d19-2100-0000-2f64-091b74050000 pid=1396->guuid=c399f867-2100-0000-2f64-091b36060000 pid=1590 execve guuid=df57e576-2100-0000-2f64-091b66060000 pid=1638 /usr/bin/chmod guuid=6d358d19-2100-0000-2f64-091b74050000 pid=1396->guuid=df57e576-2100-0000-2f64-091b66060000 pid=1638 execve guuid=f4294177-2100-0000-2f64-091b69060000 pid=1641 /usr/bin/dash guuid=6d358d19-2100-0000-2f64-091b74050000 pid=1396->guuid=f4294177-2100-0000-2f64-091b69060000 pid=1641 clone guuid=b44fc777-2100-0000-2f64-091b6c060000 pid=1644 /usr/bin/wget net send-data write-file guuid=6d358d19-2100-0000-2f64-091b74050000 pid=1396->guuid=b44fc777-2100-0000-2f64-091b6c060000 pid=1644 execve guuid=c99fca84-2100-0000-2f64-091b91060000 pid=1681 /usr/bin/chmod guuid=6d358d19-2100-0000-2f64-091b74050000 pid=1396->guuid=c99fca84-2100-0000-2f64-091b91060000 pid=1681 execve guuid=63761585-2100-0000-2f64-091b92060000 pid=1682 /usr/bin/dash guuid=6d358d19-2100-0000-2f64-091b74050000 pid=1396->guuid=63761585-2100-0000-2f64-091b92060000 pid=1682 clone guuid=1c56a785-2100-0000-2f64-091b96060000 pid=1686 /usr/bin/wget net send-data write-file guuid=6d358d19-2100-0000-2f64-091b74050000 pid=1396->guuid=1c56a785-2100-0000-2f64-091b96060000 pid=1686 execve guuid=4117d891-2100-0000-2f64-091bb6060000 pid=1718 /usr/bin/chmod guuid=6d358d19-2100-0000-2f64-091b74050000 pid=1396->guuid=4117d891-2100-0000-2f64-091bb6060000 pid=1718 execve guuid=701c1b92-2100-0000-2f64-091bb8060000 pid=1720 /usr/bin/dash guuid=6d358d19-2100-0000-2f64-091b74050000 pid=1396->guuid=701c1b92-2100-0000-2f64-091bb8060000 pid=1720 clone guuid=287dae92-2100-0000-2f64-091bbb060000 pid=1723 /usr/bin/wget net send-data write-file guuid=6d358d19-2100-0000-2f64-091b74050000 pid=1396->guuid=287dae92-2100-0000-2f64-091bbb060000 pid=1723 execve guuid=2d2dca9d-2100-0000-2f64-091bd2060000 pid=1746 /usr/bin/chmod guuid=6d358d19-2100-0000-2f64-091b74050000 pid=1396->guuid=2d2dca9d-2100-0000-2f64-091bd2060000 pid=1746 execve guuid=1cfc379e-2100-0000-2f64-091bd3060000 pid=1747 /usr/bin/dash guuid=6d358d19-2100-0000-2f64-091b74050000 pid=1396->guuid=1cfc379e-2100-0000-2f64-091bd3060000 pid=1747 clone guuid=a7c3b19f-2100-0000-2f64-091bd5060000 pid=1749 /usr/bin/wget net send-data write-file guuid=6d358d19-2100-0000-2f64-091b74050000 pid=1396->guuid=a7c3b19f-2100-0000-2f64-091bd5060000 pid=1749 execve guuid=1e9cb7b0-2100-0000-2f64-091bd6060000 pid=1750 /usr/bin/chmod guuid=6d358d19-2100-0000-2f64-091b74050000 pid=1396->guuid=1e9cb7b0-2100-0000-2f64-091bd6060000 pid=1750 execve guuid=1bc51eb1-2100-0000-2f64-091bd7060000 pid=1751 /home/sandbox/data.x86 net guuid=6d358d19-2100-0000-2f64-091b74050000 pid=1396->guuid=1bc51eb1-2100-0000-2f64-091bd7060000 pid=1751 execve guuid=3b3254b1-2100-0000-2f64-091bd9060000 pid=1753 /usr/bin/wget net send-data write-file guuid=6d358d19-2100-0000-2f64-091b74050000 pid=1396->guuid=3b3254b1-2100-0000-2f64-091bd9060000 pid=1753 execve guuid=0031c0bf-2100-0000-2f64-091bdb060000 pid=1755 /usr/bin/chmod guuid=6d358d19-2100-0000-2f64-091b74050000 pid=1396->guuid=0031c0bf-2100-0000-2f64-091bdb060000 pid=1755 execve guuid=db6805c0-2100-0000-2f64-091bdc060000 pid=1756 /home/sandbox/data.x86_64 net guuid=6d358d19-2100-0000-2f64-091b74050000 pid=1396->guuid=db6805c0-2100-0000-2f64-091bdc060000 pid=1756 execve guuid=18ff75c0-2100-0000-2f64-091bdf060000 pid=1759 /usr/bin/rm delete-file guuid=6d358d19-2100-0000-2f64-091b74050000 pid=1396->guuid=18ff75c0-2100-0000-2f64-091bdf060000 pid=1759 execve 16272418-1aa7-5a5b-8d52-420e83ac841c 5.175.223.249:80 guuid=823bcb19-2100-0000-2f64-091b76050000 pid=1398->16272418-1aa7-5a5b-8d52-420e83ac841c send: 137B guuid=bf300d28-2100-0000-2f64-091b92050000 pid=1426->16272418-1aa7-5a5b-8d52-420e83ac841c send: 137B guuid=aa9e0934-2100-0000-2f64-091bb2050000 pid=1458->16272418-1aa7-5a5b-8d52-420e83ac841c send: 137B guuid=78a0a940-2100-0000-2f64-091bcc050000 pid=1484->16272418-1aa7-5a5b-8d52-420e83ac841c send: 137B guuid=7a11f34c-2100-0000-2f64-091bec050000 pid=1516->16272418-1aa7-5a5b-8d52-420e83ac841c send: 140B guuid=37ae0a5b-2100-0000-2f64-091b14060000 pid=1556->16272418-1aa7-5a5b-8d52-420e83ac841c send: 137B guuid=c399f867-2100-0000-2f64-091b36060000 pid=1590->16272418-1aa7-5a5b-8d52-420e83ac841c send: 139B guuid=b44fc777-2100-0000-2f64-091b6c060000 pid=1644->16272418-1aa7-5a5b-8d52-420e83ac841c send: 144B guuid=1c56a785-2100-0000-2f64-091b96060000 pid=1686->16272418-1aa7-5a5b-8d52-420e83ac841c send: 146B guuid=287dae92-2100-0000-2f64-091bbb060000 pid=1723->16272418-1aa7-5a5b-8d52-420e83ac841c send: 140B guuid=a7c3b19f-2100-0000-2f64-091bd5060000 pid=1749->16272418-1aa7-5a5b-8d52-420e83ac841c send: 136B 8b0a01dc-0728-52c1-8024-c4ba7801b8d6 8.8.8.8:53 guuid=1bc51eb1-2100-0000-2f64-091bd7060000 pid=1751->8b0a01dc-0728-52c1-8024-c4ba7801b8d6 con guuid=6cc74cb1-2100-0000-2f64-091bd8060000 pid=1752 /home/sandbox/data.x86 guuid=1bc51eb1-2100-0000-2f64-091bd7060000 pid=1751->guuid=6cc74cb1-2100-0000-2f64-091bd8060000 pid=1752 clone guuid=f6b957b1-2100-0000-2f64-091bda060000 pid=1754 /home/sandbox/data.x86 net send-data write-file zombie guuid=6cc74cb1-2100-0000-2f64-091bd8060000 pid=1752->guuid=f6b957b1-2100-0000-2f64-091bda060000 pid=1754 clone guuid=3b3254b1-2100-0000-2f64-091bd9060000 pid=1753->16272418-1aa7-5a5b-8d52-420e83ac841c send: 139B guuid=f6b957b1-2100-0000-2f64-091bda060000 pid=1754->8b0a01dc-0728-52c1-8024-c4ba7801b8d6 send: 35B 79330709-4ba7-5769-b683-21ef3c41191a 45.131.65.74:8082 guuid=f6b957b1-2100-0000-2f64-091bda060000 pid=1754->79330709-4ba7-5769-b683-21ef3c41191a send: 11B guuid=f6b957b1-2100-0000-2f64-091bda060000 pid=1760 /home/sandbox/data.x86 guuid=f6b957b1-2100-0000-2f64-091bda060000 pid=1754->guuid=f6b957b1-2100-0000-2f64-091bda060000 pid=1760 clone guuid=037c4bca-2100-0000-2f64-091be1060000 pid=1761 /home/sandbox/data.x86 net write-file guuid=f6b957b1-2100-0000-2f64-091bda060000 pid=1754->guuid=037c4bca-2100-0000-2f64-091be1060000 pid=1761 clone guuid=747a71cb-2100-0000-2f64-091be2060000 pid=1762 /usr/bin/dash guuid=f6b957b1-2100-0000-2f64-091bda060000 pid=1754->guuid=747a71cb-2100-0000-2f64-091be2060000 pid=1762 execve guuid=a6db1ce0-2100-0000-2f64-091b06070000 pid=1798 /usr/bin/dash guuid=f6b957b1-2100-0000-2f64-091bda060000 pid=1754->guuid=a6db1ce0-2100-0000-2f64-091b06070000 pid=1798 execve guuid=db6805c0-2100-0000-2f64-091bdc060000 pid=1756->8b0a01dc-0728-52c1-8024-c4ba7801b8d6 con guuid=8df36ac0-2100-0000-2f64-091bdd060000 pid=1757 /home/sandbox/data.x86_64 zombie guuid=db6805c0-2100-0000-2f64-091bdc060000 pid=1756->guuid=8df36ac0-2100-0000-2f64-091bdd060000 pid=1757 clone guuid=1a7275c0-2100-0000-2f64-091bde060000 pid=1758 /home/sandbox/data.x86_64 write-file zombie guuid=8df36ac0-2100-0000-2f64-091bdd060000 pid=1757->guuid=1a7275c0-2100-0000-2f64-091bde060000 pid=1758 clone a15c7036-706e-5ee9-888f-734cbb9e72e7 127.0.0.1:30565 guuid=037c4bca-2100-0000-2f64-091be1060000 pid=1761->a15c7036-706e-5ee9-888f-734cbb9e72e7 con guuid=9d73a5cb-2100-0000-2f64-091be3060000 pid=1763 /usr/sbin/xtables-nft-multi guuid=747a71cb-2100-0000-2f64-091be2060000 pid=1762->guuid=9d73a5cb-2100-0000-2f64-091be3060000 pid=1763 execve guuid=56a452e0-2100-0000-2f64-091b07070000 pid=1799 /usr/sbin/xtables-nft-multi guuid=a6db1ce0-2100-0000-2f64-091b06070000 pid=1798->guuid=56a452e0-2100-0000-2f64-091b07070000 pid=1799 execve
Threat name:
Document-HTML.Trojan.Vigorf
Status:
Malicious
First seen:
2026-04-01 05:52:46 UTC
File Type:
Text (Shell)
AV detection:
13 of 24 (54.17%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
credential_access defense_evasion discovery linux
Behaviour
Reads runtime system information
System Network Configuration Discovery
Writes file to tmp directory
Changes its process name
Reads system network configuration
Reads process memory
Enumerates active TCP sockets
Enumerates running processes
File and Directory Permissions Modification
Executes dropped EXE
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:MAL_Linux_IoT_MultiArch_BotnetLoader_Generic
Author:Anish Bogati
Description:Technique-based detection of IoT/Linux botnet loader shell scripts downloading binaries from numeric IPs, chmodding, and executing multi-architecture payloads
Reference:MalwareBazaar sample lilin.sh

File information


The table below shows additional information about this malware sample such as delivery method and external references.

sh 24d0d3d9346bc42fc669ab17c3b0cd7cb7fd5b04587842eccdecd40309eb7fd7

(this sample)

Comments