MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 284387720bd2c67619657ee68c2f5b9aba2f64cda5da335eaf8503d3c4abcbb8. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 7


Intelligence 7 IOCs YARA 1 File information Comments

SHA256 hash: 284387720bd2c67619657ee68c2f5b9aba2f64cda5da335eaf8503d3c4abcbb8
SHA3-384 hash: 80ce8ba8251f9699ea0399acd0a6a4807f0405a49ff8e4d058f402e24a675fbe7915db3b0304512a5f8400635323be90
SHA1 hash: 187be653d91b0f4b271f834ee9cc9f998a415c6e
MD5 hash: 913ebef78b388dcf56ca2ad620231a70
humanhash: winter-massachusetts-cup-undress
File name:x.sh
Download: download sample
Signature Mirai
File size:865 bytes
First seen:2026-01-08 20:39:55 UTC
Last seen:Never
File type: sh
MIME type:text/plain
ssdeep 12:v0FZd6Td7WErm0G0FZET/HMErm0G0FZliTUErm0J:U3G7VmQOzmQ7Qmq
TLSH T16F1125D6D1B107F41DBAA923B0BAF5C4B69040CB59F27D30E08CB4D15E4CC18B1D4762
Magika batch
Reporter abuse_ch
Tags:mirai sh
URLMalware sample (SHA256 hash)SignatureTags
http://176.97.210.242/x/x.x86_648946e27fde02523e175cccdaa694bf8cbb2884b4290e6fe9dab228f6c5a2d0b2 Miraielf mirai ua-wget
http://176.97.210.242/x/x.i68614bd6c4f11b6ca0b04150ce7890757160544d57ec8354aa7d52a7c73ac176e83 Miraielf mirai ua-wget
http://176.97.210.242/x/x.aarch64a75ead9ca6cf03f44ed1d4f669e2c65d88bacc3b1ec572c1c778c79357bc6660 Miraielf mirai ua-wget

Intelligence


File Origin
# of uploads :
1
# of downloads :
50
Origin country :
DE DE
Vendor Threat Intelligence
No detections
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
medusa mirai
Verdict:
Malicious
File Type:
text
First seen:
2026-01-08T17:49:00Z UTC
Last seen:
2026-01-08T17:57:00Z UTC
Hits:
~10
Detections:
HEUR:Trojan-Downloader.Shell.Agent.p HEUR:Trojan-Downloader.Shell.Agent.a not-a-virus:HEUR:RiskTool.Script.BitMiner.gen
Status:
terminated
Behavior Graph:
%3 guuid=48a813e0-1600-0000-9904-4dafa90c0000 pid=3241 /usr/bin/sudo guuid=c59432e2-1600-0000-9904-4dafab0c0000 pid=3243 /tmp/sample.bin guuid=48a813e0-1600-0000-9904-4dafa90c0000 pid=3241->guuid=c59432e2-1600-0000-9904-4dafab0c0000 pid=3243 execve guuid=098674e2-1600-0000-9904-4dafac0c0000 pid=3244 /usr/bin/wget net send-data write-file guuid=c59432e2-1600-0000-9904-4dafab0c0000 pid=3243->guuid=098674e2-1600-0000-9904-4dafac0c0000 pid=3244 execve guuid=6d466711-1700-0000-9904-4dafff0c0000 pid=3327 /usr/bin/curl net send-data write-file guuid=c59432e2-1600-0000-9904-4dafab0c0000 pid=3243->guuid=6d466711-1700-0000-9904-4dafff0c0000 pid=3327 execve guuid=85b0d027-1700-0000-9904-4daf250d0000 pid=3365 /usr/bin/chmod guuid=c59432e2-1600-0000-9904-4dafab0c0000 pid=3243->guuid=85b0d027-1700-0000-9904-4daf250d0000 pid=3365 execve guuid=fb1f0d28-1700-0000-9904-4daf270d0000 pid=3367 /tmp/x.x86_64 mprotect-exec net send-data guuid=c59432e2-1600-0000-9904-4dafab0c0000 pid=3243->guuid=fb1f0d28-1700-0000-9904-4daf270d0000 pid=3367 execve aa169f44-2db1-571f-adef-bc8f5d0af4a6 176.97.210.242:80 guuid=098674e2-1600-0000-9904-4dafac0c0000 pid=3244->aa169f44-2db1-571f-adef-bc8f5d0af4a6 send: 139B guuid=6d466711-1700-0000-9904-4dafff0c0000 pid=3327->aa169f44-2db1-571f-adef-bc8f5d0af4a6 send: 88B 5c9f1fc2-3d7c-5c0d-ba41-14102277039e 45.155.102.89:10128 guuid=fb1f0d28-1700-0000-9904-4daf270d0000 pid=3367->5c9f1fc2-3d7c-5c0d-ba41-14102277039e send: 1644B 2a220f3b-6c0a-5a3a-abd8-a8113bd13c68 2606:a8c0:101:d8::a:10128 guuid=fb1f0d28-1700-0000-9904-4daf270d0000 pid=3367->2a220f3b-6c0a-5a3a-abd8-a8113bd13c68 send: 548B guuid=fb1f0d28-1700-0000-9904-4daf270d0000 pid=3376 /tmp/x.x86_64 guuid=fb1f0d28-1700-0000-9904-4daf270d0000 pid=3367->guuid=fb1f0d28-1700-0000-9904-4daf270d0000 pid=3376 clone guuid=fb1f0d28-1700-0000-9904-4daf270d0000 pid=3386 /tmp/x.x86_64 net send-data guuid=fb1f0d28-1700-0000-9904-4daf270d0000 pid=3367->guuid=fb1f0d28-1700-0000-9904-4daf270d0000 pid=3386 clone guuid=fb1f0d28-1700-0000-9904-4daf270d0000 pid=3387 /tmp/x.x86_64 guuid=fb1f0d28-1700-0000-9904-4daf270d0000 pid=3367->guuid=fb1f0d28-1700-0000-9904-4daf270d0000 pid=3387 clone guuid=fb1f0d28-1700-0000-9904-4daf270d0000 pid=3388 /tmp/x.x86_64 net send-data guuid=fb1f0d28-1700-0000-9904-4daf270d0000 pid=3367->guuid=fb1f0d28-1700-0000-9904-4daf270d0000 pid=3388 clone guuid=fb1f0d28-1700-0000-9904-4daf270d0000 pid=3389 /tmp/x.x86_64 guuid=fb1f0d28-1700-0000-9904-4daf270d0000 pid=3367->guuid=fb1f0d28-1700-0000-9904-4daf270d0000 pid=3389 clone 12afa0c8-76b1-5961-a306-fc706788fc1f 2606:a8c0:101:d8::a:65535 guuid=fb1f0d28-1700-0000-9904-4daf270d0000 pid=3386->12afa0c8-76b1-5961-a306-fc706788fc1f con b33d737e-c3cb-5a9e-916a-eeb92ac9e3b6 45.155.102.89:65535 guuid=fb1f0d28-1700-0000-9904-4daf270d0000 pid=3386->b33d737e-c3cb-5a9e-916a-eeb92ac9e3b6 con 4f6baed0-9587-596c-82b3-fd721afe4cc1 10.0.2.3:53 guuid=fb1f0d28-1700-0000-9904-4daf270d0000 pid=3386->4f6baed0-9587-596c-82b3-fd721afe4cc1 send: 82B guuid=fb1f0d28-1700-0000-9904-4daf270d0000 pid=3388->12afa0c8-76b1-5961-a306-fc706788fc1f con guuid=fb1f0d28-1700-0000-9904-4daf270d0000 pid=3388->b33d737e-c3cb-5a9e-916a-eeb92ac9e3b6 con guuid=fb1f0d28-1700-0000-9904-4daf270d0000 pid=3388->4f6baed0-9587-596c-82b3-fd721afe4cc1 send: 82B
Threat name:
Linux.Downloader.Medusa
Status:
Malicious
First seen:
2026-01-08 20:40:40 UTC
File Type:
Text (Shell)
AV detection:
11 of 24 (45.83%)
Threat level:
  3/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Modifies registry class
Suspicious use of SetWindowsHookEx
Enumerates physical storage devices
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:MAL_Linux_IoT_MultiArch_BotnetLoader_Generic
Author:Anish Bogati
Description:Technique-based detection of IoT/Linux botnet loader shell scripts downloading binaries from numeric IPs, chmodding, and executing multi-architecture payloads
Reference:MalwareBazaar sample lilin.sh

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh 284387720bd2c67619657ee68c2f5b9aba2f64cda5da335eaf8503d3c4abcbb8

(this sample)

  
Delivery method
Distributed via web download

Comments