MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 264c263b24e8de2d15a286c79a4179ce6023da5febe0f2381a7289bb3668cd2c. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 5


Intelligence 5 IOCs YARA File information Comments

SHA256 hash: 264c263b24e8de2d15a286c79a4179ce6023da5febe0f2381a7289bb3668cd2c
SHA3-384 hash: 371ca4df343149cb916bec1616cc7447d5421916da3afd3ce2c52f18c3b1b8bc075e600f07547dc80f56be29e307e0dd
SHA1 hash: 2e08c3230ae65e23f3cfe5f32504bf39255e1ace
MD5 hash: 57e1080e94f778670c368d635c2bb41c
humanhash: fix-nevada-april-uncle
File name:i.sh
Download: download sample
Signature Mirai
File size:379 bytes
First seen:2025-09-11 05:29:32 UTC
Last seen:2025-09-12 02:31:41 UTC
File type: sh
MIME type:text/plain
ssdeep 6:J9+d9FvnT/HWK3FP07T8Yqh7f+WhI2q7fY9K7f28o:J9+zF/KK3K7oYy7Leh7A9K7s
TLSH T131E09B9F651F165F8B08CE0532B195E1D989DA4CD0D382CBFD6600398DF1901B1E4F8E
Magika shell
Reporter abuse_ch
Tags:mirai sh
URLMalware sample (SHA256 hash)SignatureTags
http://45.153.34.7/m/moobs72e656fc5f80fb576ff4e7f9490fa122039722431b1cfcaaed9b87486c363111 Miraielf geofenced mirai ua-wget USA
http://45.153.34.7/m/mpsl2d5e61039c0a9c6b323bea1d79c169f25b8547127ee02a74984082387c439051 Miraielf geofenced mirai ua-wget USA
http://45.153.34.7/m/arm4ee0162d5ae3883caa9c5849f29c69f63996d5638bb5646c72ef50a3182f9ba92 Miraielf geofenced mirai ua-wget USA
http://45.153.34.7/m/arm59d4d5f8fa15741fa60b3821f1b036c7eaea8b6439f0223c2c140e5462b53d093 Miraielf geofenced mirai ua-wget USA
http://45.153.34.7/m/arm79a506a26a8fd18ccf75cd570a2c3f28741701d103513da821cfd2d5870a24a2b Miraielf geofenced mirai ua-wget USA

Intelligence


File Origin
# of uploads :
2
# of downloads :
53
Origin country :
DE DE
Vendor Threat Intelligence
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Status:
terminated
Behavior Graph:
%3 guuid=8cbcfe9c-1a00-0000-e2d9-b6072b0b0000 pid=2859 /usr/bin/sudo guuid=caf404a0-1a00-0000-e2d9-b607340b0000 pid=2868 /tmp/sample.bin guuid=8cbcfe9c-1a00-0000-e2d9-b6072b0b0000 pid=2859->guuid=caf404a0-1a00-0000-e2d9-b607340b0000 pid=2868 execve guuid=a1414ca0-1a00-0000-e2d9-b607360b0000 pid=2870 /usr/bin/rm guuid=caf404a0-1a00-0000-e2d9-b607340b0000 pid=2868->guuid=a1414ca0-1a00-0000-e2d9-b607360b0000 pid=2870 execve guuid=1948c6a0-1a00-0000-e2d9-b607370b0000 pid=2871 /usr/bin/wget net send-data write-file guuid=caf404a0-1a00-0000-e2d9-b607340b0000 pid=2868->guuid=1948c6a0-1a00-0000-e2d9-b607370b0000 pid=2871 execve guuid=45c2a6ab-1a00-0000-e2d9-b607510b0000 pid=2897 /usr/bin/chmod guuid=caf404a0-1a00-0000-e2d9-b607340b0000 pid=2868->guuid=45c2a6ab-1a00-0000-e2d9-b607510b0000 pid=2897 execve guuid=d3226cac-1a00-0000-e2d9-b607540b0000 pid=2900 /usr/bin/dash guuid=caf404a0-1a00-0000-e2d9-b607340b0000 pid=2868->guuid=d3226cac-1a00-0000-e2d9-b607540b0000 pid=2900 clone guuid=75507dae-1a00-0000-e2d9-b6075a0b0000 pid=2906 /usr/bin/wget net send-data write-file guuid=caf404a0-1a00-0000-e2d9-b607340b0000 pid=2868->guuid=75507dae-1a00-0000-e2d9-b6075a0b0000 pid=2906 execve guuid=482900ba-1a00-0000-e2d9-b6076d0b0000 pid=2925 /usr/bin/chmod guuid=caf404a0-1a00-0000-e2d9-b607340b0000 pid=2868->guuid=482900ba-1a00-0000-e2d9-b6076d0b0000 pid=2925 execve guuid=224951ba-1a00-0000-e2d9-b6076e0b0000 pid=2926 /usr/bin/dash guuid=caf404a0-1a00-0000-e2d9-b607340b0000 pid=2868->guuid=224951ba-1a00-0000-e2d9-b6076e0b0000 pid=2926 clone guuid=4f600ebb-1a00-0000-e2d9-b607700b0000 pid=2928 /usr/bin/wget net send-data write-file guuid=caf404a0-1a00-0000-e2d9-b607340b0000 pid=2868->guuid=4f600ebb-1a00-0000-e2d9-b607700b0000 pid=2928 execve guuid=10a59ec4-1a00-0000-e2d9-b607800b0000 pid=2944 /usr/bin/chmod guuid=caf404a0-1a00-0000-e2d9-b607340b0000 pid=2868->guuid=10a59ec4-1a00-0000-e2d9-b607800b0000 pid=2944 execve guuid=8694fdc4-1a00-0000-e2d9-b607810b0000 pid=2945 /usr/bin/dash guuid=caf404a0-1a00-0000-e2d9-b607340b0000 pid=2868->guuid=8694fdc4-1a00-0000-e2d9-b607810b0000 pid=2945 clone guuid=4d228fc5-1a00-0000-e2d9-b607850b0000 pid=2949 /usr/bin/wget net send-data write-file guuid=caf404a0-1a00-0000-e2d9-b607340b0000 pid=2868->guuid=4d228fc5-1a00-0000-e2d9-b607850b0000 pid=2949 execve guuid=bdc2e4ce-1a00-0000-e2d9-b607960b0000 pid=2966 /usr/bin/chmod guuid=caf404a0-1a00-0000-e2d9-b607340b0000 pid=2868->guuid=bdc2e4ce-1a00-0000-e2d9-b607960b0000 pid=2966 execve guuid=e9b543cf-1a00-0000-e2d9-b607990b0000 pid=2969 /usr/bin/dash guuid=caf404a0-1a00-0000-e2d9-b607340b0000 pid=2868->guuid=e9b543cf-1a00-0000-e2d9-b607990b0000 pid=2969 clone guuid=e1eb92d1-1a00-0000-e2d9-b607a00b0000 pid=2976 /usr/bin/wget net send-data write-file guuid=caf404a0-1a00-0000-e2d9-b607340b0000 pid=2868->guuid=e1eb92d1-1a00-0000-e2d9-b607a00b0000 pid=2976 execve guuid=5bf9b7db-1a00-0000-e2d9-b607b10b0000 pid=2993 /usr/bin/chmod guuid=caf404a0-1a00-0000-e2d9-b607340b0000 pid=2868->guuid=5bf9b7db-1a00-0000-e2d9-b607b10b0000 pid=2993 execve guuid=f12e1edc-1a00-0000-e2d9-b607b30b0000 pid=2995 /usr/bin/dash guuid=caf404a0-1a00-0000-e2d9-b607340b0000 pid=2868->guuid=f12e1edc-1a00-0000-e2d9-b607b30b0000 pid=2995 clone guuid=36b51fdd-1a00-0000-e2d9-b607b60b0000 pid=2998 /usr/bin/rm delete-file guuid=caf404a0-1a00-0000-e2d9-b607340b0000 pid=2868->guuid=36b51fdd-1a00-0000-e2d9-b607b60b0000 pid=2998 execve 23c74451-b3ac-5f7c-b701-76385baac483 45.153.34.7:80 guuid=1948c6a0-1a00-0000-e2d9-b607370b0000 pid=2871->23c74451-b3ac-5f7c-b701-76385baac483 send: 133B guuid=75507dae-1a00-0000-e2d9-b6075a0b0000 pid=2906->23c74451-b3ac-5f7c-b701-76385baac483 send: 132B guuid=4f600ebb-1a00-0000-e2d9-b607700b0000 pid=2928->23c74451-b3ac-5f7c-b701-76385baac483 send: 132B guuid=4d228fc5-1a00-0000-e2d9-b607850b0000 pid=2949->23c74451-b3ac-5f7c-b701-76385baac483 send: 132B guuid=e1eb92d1-1a00-0000-e2d9-b607a00b0000 pid=2976->23c74451-b3ac-5f7c-b701-76385baac483 send: 132B
Threat name:
Linux.Downloader.Generic
Status:
Suspicious
First seen:
2025-09-11 05:31:00 UTC
File Type:
Text (Shell)
AV detection:
6 of 38 (15.79%)
Threat level:
  3/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Modifies registry class
Suspicious use of SetWindowsHookEx
Enumerates physical storage devices
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh 264c263b24e8de2d15a286c79a4179ce6023da5febe0f2381a7289bb3668cd2c

(this sample)

  
Delivery method
Distributed via web download

Comments