MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 2529343c7140b940d907e1aab69fa5565b16c768e99425c7cd1194491ebed81d. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 4


Intelligence 4 IOCs YARA 1 File information Comments

SHA256 hash: 2529343c7140b940d907e1aab69fa5565b16c768e99425c7cd1194491ebed81d
SHA3-384 hash: 536fbce714b173542b3921fc770ea4fce7ed8f02230986499ff7beeb37069de85eace2bad5a2c362d59b57f3036e47b4
SHA1 hash: 18181522b7d86d4640b2c7b9c169123fe775c17b
MD5 hash: aecb38eff30b8271de5ade2b47fe21b1
humanhash: social-freddie-louisiana-indigo
File name:o.xml
Download: download sample
Signature Mirai
File size:740 bytes
First seen:2025-09-05 14:57:54 UTC
Last seen:Never
File type: sh
MIME type:text/plain
ssdeep 12:FH8ioNJAC7ukxGWi2jU30+0K5+A+MjR2p+vhp+RBc5ZhG+Eq:FH8j/wWi2jz8S+vf+Ru
TLSH T17A01266DE1A88A5205B5C5C7B6F0950AC15180CFA2AE57E5F28E092A6F28C4E345320D
Magika xml
Reporter abuse_ch
Tags:mirai sh
URLMalware sample (SHA256 hash)SignatureTags
http://196.251.87.166/bins/morte.x86224bb391451b00c3c44269f7d9d94caa59623c65e08e24de22420f4f21686440 Miraielf mirai ua-wget

Intelligence


File Origin
# of uploads :
1
# of downloads :
27
Origin country :
DE DE
Vendor Threat Intelligence
Status:
terminated
Behavior Graph:
%3 guuid=7b761e1c-1900-0000-4af9-4b18760c0000 pid=3190 /usr/bin/sudo guuid=2c6c2a1f-1900-0000-4af9-4b18790c0000 pid=3193 /tmp/sample.bin guuid=7b761e1c-1900-0000-4af9-4b18760c0000 pid=3190->guuid=2c6c2a1f-1900-0000-4af9-4b18790c0000 pid=3193 execve guuid=6090b81f-1900-0000-4af9-4b187b0c0000 pid=3195 /usr/bin/dash guuid=2c6c2a1f-1900-0000-4af9-4b18790c0000 pid=3193->guuid=6090b81f-1900-0000-4af9-4b187b0c0000 pid=3195 clone guuid=9df6ce1f-1900-0000-4af9-4b187c0c0000 pid=3196 /usr/bin/dash guuid=2c6c2a1f-1900-0000-4af9-4b18790c0000 pid=3193->guuid=9df6ce1f-1900-0000-4af9-4b187c0c0000 pid=3196 clone guuid=f1e6e41f-1900-0000-4af9-4b187d0c0000 pid=3197 /usr/bin/curl net send-data write-file guuid=2c6c2a1f-1900-0000-4af9-4b18790c0000 pid=3193->guuid=f1e6e41f-1900-0000-4af9-4b187d0c0000 pid=3197 execve guuid=adaecc29-1900-0000-4af9-4b188e0c0000 pid=3214 /usr/bin/wget net send-data write-file guuid=2c6c2a1f-1900-0000-4af9-4b18790c0000 pid=3193->guuid=adaecc29-1900-0000-4af9-4b188e0c0000 pid=3214 execve guuid=f7c5622d-1900-0000-4af9-4b188f0c0000 pid=3215 /usr/bin/chmod guuid=2c6c2a1f-1900-0000-4af9-4b18790c0000 pid=3193->guuid=f7c5622d-1900-0000-4af9-4b188f0c0000 pid=3215 execve guuid=b629ba2d-1900-0000-4af9-4b18900c0000 pid=3216 /home/sandbox/morte.x86 net guuid=2c6c2a1f-1900-0000-4af9-4b18790c0000 pid=3193->guuid=b629ba2d-1900-0000-4af9-4b18900c0000 pid=3216 execve e0e21a48-ffad-5b01-84ef-2ee6b5294738 196.251.87.166:80 guuid=f1e6e41f-1900-0000-4af9-4b187d0c0000 pid=3197->e0e21a48-ffad-5b01-84ef-2ee6b5294738 send: 92B guuid=adaecc29-1900-0000-4af9-4b188e0c0000 pid=3214->e0e21a48-ffad-5b01-84ef-2ee6b5294738 send: 143B 8b0a01dc-0728-52c1-8024-c4ba7801b8d6 8.8.8.8:53 guuid=b629ba2d-1900-0000-4af9-4b18900c0000 pid=3216->8b0a01dc-0728-52c1-8024-c4ba7801b8d6 con guuid=59e3562e-1900-0000-4af9-4b18910c0000 pid=3217 /home/sandbox/morte.x86 guuid=b629ba2d-1900-0000-4af9-4b18900c0000 pid=3216->guuid=59e3562e-1900-0000-4af9-4b18910c0000 pid=3217 clone guuid=f534a62e-1900-0000-4af9-4b18920c0000 pid=3218 /home/sandbox/morte.x86 write-config zombie guuid=59e3562e-1900-0000-4af9-4b18910c0000 pid=3217->guuid=f534a62e-1900-0000-4af9-4b18920c0000 pid=3218 clone guuid=6afdbf32-1900-0000-4af9-4b18930c0000 pid=3219 /usr/bin/dash guuid=f534a62e-1900-0000-4af9-4b18920c0000 pid=3218->guuid=6afdbf32-1900-0000-4af9-4b18930c0000 pid=3219 execve guuid=110c8635-1900-0000-4af9-4b18950c0000 pid=3221 /home/sandbox/morte.x86 delete-file dns net send-data guuid=f534a62e-1900-0000-4af9-4b18920c0000 pid=3218->guuid=110c8635-1900-0000-4af9-4b18950c0000 pid=3221 clone guuid=139f0533-1900-0000-4af9-4b18940c0000 pid=3220 /usr/bin/cp guuid=6afdbf32-1900-0000-4af9-4b18930c0000 pid=3219->guuid=139f0533-1900-0000-4af9-4b18940c0000 pid=3220 execve guuid=110c8635-1900-0000-4af9-4b18950c0000 pid=3221->8b0a01dc-0728-52c1-8024-c4ba7801b8d6 send: 28B 7714685f-b9c2-5302-a2db-d78b8a5f414c ransokk.de:12121 guuid=110c8635-1900-0000-4af9-4b18950c0000 pid=3221->7714685f-b9c2-5302-a2db-d78b8a5f414c send: 27B
Threat name:
Script-JS.Trojan.Heuristic
Status:
Malicious
First seen:
2025-09-05 15:26:40 UTC
File Type:
Text
AV detection:
6 of 38 (15.79%)
Threat level:
  2/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Modifies registry class
Suspicious use of SetWindowsHookEx
Enumerates physical storage devices
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:ach_202412_suspect_bash_script
Author:abuse.ch
Description:Detects suspicious Linux bash scripts

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh 2529343c7140b940d907e1aab69fa5565b16c768e99425c7cd1194491ebed81d

(this sample)

  
Delivery method
Distributed via web download

Comments