MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 28cfc5deec374ad8e21c95db6db27912a90ac5345b5a6b6a63a0bf1171e8eeff. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 10


Intelligence 10 IOCs YARA 2 File information Comments

SHA256 hash: 28cfc5deec374ad8e21c95db6db27912a90ac5345b5a6b6a63a0bf1171e8eeff
SHA3-384 hash: b560713a3127219fc598c5d2d06effed9fbf10793a0393e7f22f5a579bc39fc1ac946686892549d82e6253af688ce31c
SHA1 hash: 825de7082ef503bd5e8669dc7c4fef8952c8302d
MD5 hash: add8a3a22dbcff10a1ed5c5d7f1faa6d
humanhash: quebec-alpha-gee-uncle
File name:sensi.sh
Download: download sample
Signature Mirai
File size:1'693 bytes
First seen:2026-02-01 23:00:32 UTC
Last seen:Never
File type: sh
MIME type:text/x-shellscript
ssdeep 24:vMUMiU0IiKWURNRAUTtUKqcbUHbUBUCU0In:vMUrU0lKWURXAUBUYU7UBUCU9n
TLSH T1E831B2D92201813D2C6EE9A375F60D8D368D9097B0E8AF0CD9E8B8E6448FF1475C0E43
TrID 70.0% (.SH) Linux/UNIX shell script (7000/1)
30.0% (.) Unix-like shebang (var.3) (gen) (3000/1)
Magika shell
Reporter abuse_ch
Tags:mirai sh
URLMalware sample (SHA256 hash)SignatureTags
http://185.209.161.130/d/xd.x8684b54357c378c2f9ac436a172134818d429972dc8800f63716cc3f43101b7438 Miraimirai opendir
http://185.209.161.130/d/xd.mipsc58008f9d4edee4ab0188d6a6150350f213412fc16a110178fced4088fc961e3 Miraimirai opendir
http://185.209.161.130/d/xd.mpsl6518689838fca79e956248a6ca485980c41669af85e8b7dc97b57e8fb23b09cf Miraimirai opendir
http://185.209.161.130/d/xd.arm4n/an/aelf ua-wget
http://185.209.161.130/d/xd.arm52e20912a786e72d26bdd6e45d742d3f755efd7524ef6852f7bef2f3f014b8592 Miraimirai opendir
http://185.209.161.130/d/xd.arm6c46f0ebc836c148640efe89685dbe45290aeedd9ba0ce470207b5f27ae2b899b Miraimirai opendir
http://185.209.161.130/d/xd.arm71237806366200284217cf30fd9072c62b98c063ae3154779e199d08ebfafb104 Miraimirai opendir
http://185.209.161.130/d/xd.ppc8f54bd476f3c1f2def8c3e0788ceffb6e54b9dbea4664ec24411e987c80ea6b5 Miraimirai opendir
http://185.209.161.130/d/xd.m68ke3e2e524358b1c9a6937cb8a1ed445805f6b9ca79b34a5275f57db6a727ae440 Miraimirai opendir
http://185.209.161.130/d/xd.sh4e9616179b83b14eef952d7f805678b1e60a808068bacd8a0a1d2f38386966664 Miraimirai opendir

Intelligence


File Origin
# of uploads :
1
# of downloads :
58
Origin country :
DE DE
Vendor Threat Intelligence
Gathering data
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
botnet medusa mirai obfuscated
Result
Gathering data
Verdict:
Malicious
File Type:
unix shell
Detections:
HEUR:Trojan-Downloader.Shell.Agent.p HEUR:Trojan-Downloader.Shell.Agent.gen HEUR:Trojan-Downloader.Shell.Agent.a
Threat name:
Linux.Downloader.Morila
Status:
Malicious
First seen:
2026-02-01 23:00:56 UTC
File Type:
Text (Shell)
AV detection:
22 of 36 (61.11%)
Threat level:
  3/5
Result
Malware family:
Score:
  10/10
Tags:
family:mirai botnet:lzrd antivm botnet defense_evasion discovery linux upx
Behaviour
Reads runtime system information
System Network Configuration Discovery
Writes file to tmp directory
Checks CPU configuration
Reads system network configuration
UPX packed file
Enumerates active TCP sockets
Enumerates running processes
File and Directory Permissions Modification
Executes dropped EXE
Modifies Watchdog functionality
Contacts a large (142957) amount of remote hosts
Creates a large amount of network flows
Mirai
Mirai family
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Linux_Shellscript_Downloader
Author:albertzsigovits
Description:Generic Approach to Shellscript downloaders
Rule name:MAL_Linux_IoT_MultiArch_BotnetLoader_Generic
Author:Anish Bogati
Description:Technique-based detection of IoT/Linux botnet loader shell scripts downloading binaries from numeric IPs, chmodding, and executing multi-architecture payloads
Reference:MalwareBazaar sample lilin.sh

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh 28cfc5deec374ad8e21c95db6db27912a90ac5345b5a6b6a63a0bf1171e8eeff

(this sample)

  
Delivery method
Distributed via web download

Comments