MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 27ae9a46d723531b26452f5ec169ef2a90074d5b206ec617f08bb0a9e8405c15. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: 27ae9a46d723531b26452f5ec169ef2a90074d5b206ec617f08bb0a9e8405c15
SHA3-384 hash: d5aa07f34a4dee58ff47146274c06e8c92a30919c70083d1e4d9cd724c8c4604c44c60ade97b9663794eca4efa9acfc1
SHA1 hash: 44c491234b6471c25efedd8a30f135018dcc2361
MD5 hash: 9f779076a2a9e72f46330f05f2fb8ceb
humanhash: utah-magazine-california-march
File name:w.sh
Download: download sample
Signature Mirai
File size:906 bytes
First seen:2025-08-21 07:52:27 UTC
Last seen:Never
File type: sh
MIME type:text/plain
ssdeep 24:3j3Ya8NI7TEKj9+I32jAOTIHlvat8rvgasn:zYQAnImdks
TLSH T19E11E2CD57B271620988CD64606984C8953599D031C80F9EDC8E1CF7D9E9F117236E7D
Magika txt
Reporter abuse_ch
Tags:mirai sh
URLMalware sample (SHA256 hash)SignatureTags
http://161.97.74.69/systemcl/arma2812bf91c1836b0749615f8c92f49b055ed1152a0cfcb03cffb4473388ae1f9 Mirai32-bit elf mirai Mozi
http://161.97.74.69/systemcl/arm5467ca3ecdb388a31f9687f3f93134ae992fbfbe2936cfbd700c3d198b3b65ecb Miraielf mirai ua-wget
http://161.97.74.69/systemcl/arm67a4627901da5e02ceacaf688cc103b4944a3cf75b4f1f4316ee638893eaa4104 Miraielf mirai ua-wget
http://161.97.74.69/systemcl/arm71745a1dc09e108e719186017f4d6f10e1835aa4ba3f74b50b8394e3268c66524 Miraielf mirai ua-wget
http://161.97.74.69/systemcl/m68k19abfca0200531ee5ddc2dd7bc4454af84d9ffe0ef2e12cd2a54fc828ebdc659 Miraielf mirai ua-wget
http://161.97.74.69/systemcl/mipsad42066092b60784e1579fb3742cf3a41450dacc13b254e9c3a0c5b84aaf0db4 Mirai32-bit elf mirai Mozi
http://161.97.74.69/systemcl/mpsl7365564e3fc5bc60caa91eb8b6b87a6d8da423389be87134899fcd0caaeb3242 Miraielf mirai ua-wget
http://161.97.74.69/systemcl/ppcabfd19ac36a02a8d3552a65a6e023b7499af427f7ea558cbc5064b8475bd955e Miraielf mirai ua-wget
http://161.97.74.69/systemcl/sh4b5d5a320320766751e9a1e31bc6ff850196e0c3f0b5baee15eee600b8a3cdae2 Miraielf mirai ua-wget
http://161.97.74.69/systemcl/spc2b4e44a8a37c63ce0a2c007bb22d903ae9d13b643b6b556f4d15199926cdd54c Miraielf mirai ua-wget
http://161.97.74.69/systemcl/x862e9b4bb064c078485eab38389da45cfecd1f865d77cd5c199ae3c2fe195daf72 Mirai32-bit elf mirai Mozi
http://161.97.74.69/systemcl/x86_6447a0fa2b9aa3ebdb48324d5ad43903187a528176193716db81991191b3d3b230 Miraielf mirai ua-wget

Intelligence


File Origin
# of uploads :
1
# of downloads :
30
Origin country :
DE DE
Vendor Threat Intelligence
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
busybox evasive
Status:
terminated
Behavior Graph:
%3 guuid=34f973ea-1a00-0000-1529-5ccc6d0c0000 pid=3181 /usr/bin/sudo guuid=ec609cec-1a00-0000-1529-5ccc6f0c0000 pid=3183 /tmp/sample.bin guuid=34f973ea-1a00-0000-1529-5ccc6d0c0000 pid=3181->guuid=ec609cec-1a00-0000-1529-5ccc6f0c0000 pid=3183 execve guuid=5396ddec-1a00-0000-1529-5ccc710c0000 pid=3185 /usr/bin/busybox net send-data write-file guuid=ec609cec-1a00-0000-1529-5ccc6f0c0000 pid=3183->guuid=5396ddec-1a00-0000-1529-5ccc710c0000 pid=3185 execve guuid=afe522f2-1a00-0000-1529-5ccc7c0c0000 pid=3196 /usr/bin/chmod guuid=ec609cec-1a00-0000-1529-5ccc6f0c0000 pid=3183->guuid=afe522f2-1a00-0000-1529-5ccc7c0c0000 pid=3196 execve guuid=a9105ff2-1a00-0000-1529-5ccc7d0c0000 pid=3197 /usr/bin/dash guuid=ec609cec-1a00-0000-1529-5ccc6f0c0000 pid=3183->guuid=a9105ff2-1a00-0000-1529-5ccc7d0c0000 pid=3197 clone guuid=fde565f3-1a00-0000-1529-5ccc810c0000 pid=3201 /usr/bin/busybox net send-data write-file guuid=ec609cec-1a00-0000-1529-5ccc6f0c0000 pid=3183->guuid=fde565f3-1a00-0000-1529-5ccc810c0000 pid=3201 execve guuid=d97cdef8-1a00-0000-1529-5ccc8c0c0000 pid=3212 /usr/bin/chmod guuid=ec609cec-1a00-0000-1529-5ccc6f0c0000 pid=3183->guuid=d97cdef8-1a00-0000-1529-5ccc8c0c0000 pid=3212 execve guuid=90a81ff9-1a00-0000-1529-5ccc8e0c0000 pid=3214 /usr/bin/dash guuid=ec609cec-1a00-0000-1529-5ccc6f0c0000 pid=3183->guuid=90a81ff9-1a00-0000-1529-5ccc8e0c0000 pid=3214 clone guuid=07dfbcf9-1a00-0000-1529-5ccc920c0000 pid=3218 /usr/bin/busybox net send-data write-file guuid=ec609cec-1a00-0000-1529-5ccc6f0c0000 pid=3183->guuid=07dfbcf9-1a00-0000-1529-5ccc920c0000 pid=3218 execve guuid=14b1b8fc-1a00-0000-1529-5ccc930c0000 pid=3219 /usr/bin/chmod guuid=ec609cec-1a00-0000-1529-5ccc6f0c0000 pid=3183->guuid=14b1b8fc-1a00-0000-1529-5ccc930c0000 pid=3219 execve guuid=e14113fd-1a00-0000-1529-5ccc940c0000 pid=3220 /usr/bin/dash guuid=ec609cec-1a00-0000-1529-5ccc6f0c0000 pid=3183->guuid=e14113fd-1a00-0000-1529-5ccc940c0000 pid=3220 clone guuid=586f14fe-1a00-0000-1529-5ccc960c0000 pid=3222 /usr/bin/busybox net send-data write-file guuid=ec609cec-1a00-0000-1529-5ccc6f0c0000 pid=3183->guuid=586f14fe-1a00-0000-1529-5ccc960c0000 pid=3222 execve guuid=8c2acb00-1b00-0000-1529-5ccc970c0000 pid=3223 /usr/bin/chmod guuid=ec609cec-1a00-0000-1529-5ccc6f0c0000 pid=3183->guuid=8c2acb00-1b00-0000-1529-5ccc970c0000 pid=3223 execve guuid=eb226601-1b00-0000-1529-5ccc980c0000 pid=3224 /usr/bin/dash guuid=ec609cec-1a00-0000-1529-5ccc6f0c0000 pid=3183->guuid=eb226601-1b00-0000-1529-5ccc980c0000 pid=3224 clone guuid=cea17502-1b00-0000-1529-5ccc9a0c0000 pid=3226 /usr/bin/busybox net send-data write-file guuid=ec609cec-1a00-0000-1529-5ccc6f0c0000 pid=3183->guuid=cea17502-1b00-0000-1529-5ccc9a0c0000 pid=3226 execve guuid=e0feae0a-1b00-0000-1529-5ccc9b0c0000 pid=3227 /usr/bin/chmod guuid=ec609cec-1a00-0000-1529-5ccc6f0c0000 pid=3183->guuid=e0feae0a-1b00-0000-1529-5ccc9b0c0000 pid=3227 execve guuid=5f501f0b-1b00-0000-1529-5ccc9c0c0000 pid=3228 /usr/bin/dash guuid=ec609cec-1a00-0000-1529-5ccc6f0c0000 pid=3183->guuid=5f501f0b-1b00-0000-1529-5ccc9c0c0000 pid=3228 clone guuid=f2ee180c-1b00-0000-1529-5ccc9e0c0000 pid=3230 /usr/bin/busybox net send-data write-file guuid=ec609cec-1a00-0000-1529-5ccc6f0c0000 pid=3183->guuid=f2ee180c-1b00-0000-1529-5ccc9e0c0000 pid=3230 execve guuid=731fc10f-1b00-0000-1529-5ccca00c0000 pid=3232 /usr/bin/chmod guuid=ec609cec-1a00-0000-1529-5ccc6f0c0000 pid=3183->guuid=731fc10f-1b00-0000-1529-5ccca00c0000 pid=3232 execve guuid=f49d0c10-1b00-0000-1529-5ccca10c0000 pid=3233 /usr/bin/dash guuid=ec609cec-1a00-0000-1529-5ccc6f0c0000 pid=3183->guuid=f49d0c10-1b00-0000-1529-5ccca10c0000 pid=3233 clone guuid=f98e6311-1b00-0000-1529-5ccca50c0000 pid=3237 /usr/bin/busybox net send-data write-file guuid=ec609cec-1a00-0000-1529-5ccc6f0c0000 pid=3183->guuid=f98e6311-1b00-0000-1529-5ccca50c0000 pid=3237 execve guuid=671a151a-1b00-0000-1529-5cccb50c0000 pid=3253 /usr/bin/chmod guuid=ec609cec-1a00-0000-1529-5ccc6f0c0000 pid=3183->guuid=671a151a-1b00-0000-1529-5cccb50c0000 pid=3253 execve guuid=6467551a-1b00-0000-1529-5cccb70c0000 pid=3255 /usr/bin/dash guuid=ec609cec-1a00-0000-1529-5ccc6f0c0000 pid=3183->guuid=6467551a-1b00-0000-1529-5cccb70c0000 pid=3255 clone guuid=2f79e91a-1b00-0000-1529-5cccbb0c0000 pid=3259 /usr/bin/busybox net send-data write-file guuid=ec609cec-1a00-0000-1529-5ccc6f0c0000 pid=3183->guuid=2f79e91a-1b00-0000-1529-5cccbb0c0000 pid=3259 execve guuid=d028051d-1b00-0000-1529-5cccbc0c0000 pid=3260 /usr/bin/chmod guuid=ec609cec-1a00-0000-1529-5ccc6f0c0000 pid=3183->guuid=d028051d-1b00-0000-1529-5cccbc0c0000 pid=3260 execve guuid=9c36671d-1b00-0000-1529-5cccbd0c0000 pid=3261 /usr/bin/dash guuid=ec609cec-1a00-0000-1529-5ccc6f0c0000 pid=3183->guuid=9c36671d-1b00-0000-1529-5cccbd0c0000 pid=3261 clone guuid=b81df71e-1b00-0000-1529-5cccbf0c0000 pid=3263 /usr/bin/busybox net send-data write-file guuid=ec609cec-1a00-0000-1529-5ccc6f0c0000 pid=3183->guuid=b81df71e-1b00-0000-1529-5cccbf0c0000 pid=3263 execve guuid=39a9762b-1b00-0000-1529-5cccce0c0000 pid=3278 /usr/bin/chmod guuid=ec609cec-1a00-0000-1529-5ccc6f0c0000 pid=3183->guuid=39a9762b-1b00-0000-1529-5cccce0c0000 pid=3278 execve guuid=1833c82b-1b00-0000-1529-5ccccf0c0000 pid=3279 /usr/bin/dash guuid=ec609cec-1a00-0000-1529-5ccc6f0c0000 pid=3183->guuid=1833c82b-1b00-0000-1529-5ccccf0c0000 pid=3279 clone guuid=1219ae2c-1b00-0000-1529-5cccd10c0000 pid=3281 /usr/bin/busybox net send-data write-file guuid=ec609cec-1a00-0000-1529-5ccc6f0c0000 pid=3183->guuid=1219ae2c-1b00-0000-1529-5cccd10c0000 pid=3281 execve guuid=0ca4183a-1b00-0000-1529-5ccce10c0000 pid=3297 /usr/bin/chmod guuid=ec609cec-1a00-0000-1529-5ccc6f0c0000 pid=3183->guuid=0ca4183a-1b00-0000-1529-5ccce10c0000 pid=3297 execve guuid=ecb5643a-1b00-0000-1529-5ccce20c0000 pid=3298 /usr/bin/dash guuid=ec609cec-1a00-0000-1529-5ccc6f0c0000 pid=3183->guuid=ecb5643a-1b00-0000-1529-5ccce20c0000 pid=3298 clone guuid=df26ee3a-1b00-0000-1529-5ccce60c0000 pid=3302 /usr/bin/busybox net send-data write-file guuid=ec609cec-1a00-0000-1529-5ccc6f0c0000 pid=3183->guuid=df26ee3a-1b00-0000-1529-5ccce60c0000 pid=3302 execve guuid=e60cf641-1b00-0000-1529-5cccf00c0000 pid=3312 /usr/bin/chmod guuid=ec609cec-1a00-0000-1529-5ccc6f0c0000 pid=3183->guuid=e60cf641-1b00-0000-1529-5cccf00c0000 pid=3312 execve guuid=b9827c42-1b00-0000-1529-5cccf10c0000 pid=3313 /home/sandbox/x86 net guuid=ec609cec-1a00-0000-1529-5ccc6f0c0000 pid=3183->guuid=b9827c42-1b00-0000-1529-5cccf10c0000 pid=3313 execve guuid=28f18c54-1b00-0000-1529-5ccc0e0d0000 pid=3342 /usr/bin/busybox net send-data write-file guuid=ec609cec-1a00-0000-1529-5ccc6f0c0000 pid=3183->guuid=28f18c54-1b00-0000-1529-5ccc0e0d0000 pid=3342 execve guuid=ba62095f-1b00-0000-1529-5ccc260d0000 pid=3366 /usr/bin/chmod guuid=ec609cec-1a00-0000-1529-5ccc6f0c0000 pid=3183->guuid=ba62095f-1b00-0000-1529-5ccc260d0000 pid=3366 execve guuid=65c2525f-1b00-0000-1529-5ccc270d0000 pid=3367 /usr/bin/dash guuid=ec609cec-1a00-0000-1529-5ccc6f0c0000 pid=3183->guuid=65c2525f-1b00-0000-1529-5ccc270d0000 pid=3367 clone guuid=546da461-1b00-0000-1529-5ccc2c0d0000 pid=3372 /usr/bin/rm delete-file guuid=ec609cec-1a00-0000-1529-5ccc6f0c0000 pid=3183->guuid=546da461-1b00-0000-1529-5ccc2c0d0000 pid=3372 execve 1859fa66-700c-573f-a69b-967c040da2df 161.97.74.69:80 guuid=5396ddec-1a00-0000-1529-5ccc710c0000 pid=3185->1859fa66-700c-573f-a69b-967c040da2df send: 87B guuid=fde565f3-1a00-0000-1529-5ccc810c0000 pid=3201->1859fa66-700c-573f-a69b-967c040da2df send: 88B guuid=07dfbcf9-1a00-0000-1529-5ccc920c0000 pid=3218->1859fa66-700c-573f-a69b-967c040da2df send: 88B guuid=586f14fe-1a00-0000-1529-5ccc960c0000 pid=3222->1859fa66-700c-573f-a69b-967c040da2df send: 88B guuid=cea17502-1b00-0000-1529-5ccc9a0c0000 pid=3226->1859fa66-700c-573f-a69b-967c040da2df send: 88B guuid=f2ee180c-1b00-0000-1529-5ccc9e0c0000 pid=3230->1859fa66-700c-573f-a69b-967c040da2df send: 88B guuid=f98e6311-1b00-0000-1529-5ccca50c0000 pid=3237->1859fa66-700c-573f-a69b-967c040da2df send: 88B guuid=2f79e91a-1b00-0000-1529-5cccbb0c0000 pid=3259->1859fa66-700c-573f-a69b-967c040da2df send: 87B guuid=b81df71e-1b00-0000-1529-5cccbf0c0000 pid=3263->1859fa66-700c-573f-a69b-967c040da2df send: 87B guuid=1219ae2c-1b00-0000-1529-5cccd10c0000 pid=3281->1859fa66-700c-573f-a69b-967c040da2df send: 87B guuid=df26ee3a-1b00-0000-1529-5ccce60c0000 pid=3302->1859fa66-700c-573f-a69b-967c040da2df send: 87B 8b0a01dc-0728-52c1-8024-c4ba7801b8d6 8.8.8.8:53 guuid=b9827c42-1b00-0000-1529-5cccf10c0000 pid=3313->8b0a01dc-0728-52c1-8024-c4ba7801b8d6 con guuid=e35b7e54-1b00-0000-1529-5ccc0c0d0000 pid=3340 /home/sandbox/x86 guuid=b9827c42-1b00-0000-1529-5cccf10c0000 pid=3313->guuid=e35b7e54-1b00-0000-1529-5ccc0c0d0000 pid=3340 clone guuid=3e0b8354-1b00-0000-1529-5ccc0d0d0000 pid=3341 /home/sandbox/x86 net send-data zombie guuid=b9827c42-1b00-0000-1529-5cccf10c0000 pid=3313->guuid=3e0b8354-1b00-0000-1529-5ccc0d0d0000 pid=3341 clone guuid=3e0b8354-1b00-0000-1529-5ccc0d0d0000 pid=3341->8b0a01dc-0728-52c1-8024-c4ba7801b8d6 con dfbb6132-9b3a-5fcc-ae73-0a5bea22ee6b 87.121.84.220:61459 guuid=3e0b8354-1b00-0000-1529-5ccc0d0d0000 pid=3341->dfbb6132-9b3a-5fcc-ae73-0a5bea22ee6b send: 43B guuid=28f18c54-1b00-0000-1529-5ccc0e0d0000 pid=3342->1859fa66-700c-573f-a69b-967c040da2df send: 90B
Threat name:
Linux.Trojan.Alevaul
Status:
Malicious
First seen:
2025-08-21 06:35:36 UTC
File Type:
Text (Shell)
AV detection:
18 of 38 (47.37%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Modifies registry class
Suspicious use of SetWindowsHookEx
Enumerates physical storage devices
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh 27ae9a46d723531b26452f5ec169ef2a90074d5b206ec617f08bb0a9e8405c15

(this sample)

  
Delivery method
Distributed via web download

Comments