MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 2d5e2d77ba36d07dd6099b9cb0247242d489d2255b57f9f2290f2cdaa35f9ba2. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 7


Intelligence 7 IOCs YARA 1 File information Comments

SHA256 hash: 2d5e2d77ba36d07dd6099b9cb0247242d489d2255b57f9f2290f2cdaa35f9ba2
SHA3-384 hash: 9fcae4ff7321f93d541886885c46edafac36687c4d32098f8cbb7d52358628981ff358c9d292e9a1de61de44f298dfea
SHA1 hash: 7506f63e27a13e05987bd5d0103448985c58d4e9
MD5 hash: 8151d17630d89d6a5a235c1d3b6cf9e4
humanhash: arizona-london-pasta-beryllium
File name:w.sh
Download: download sample
Signature Mirai
File size:819 bytes
First seen:2026-01-13 01:31:20 UTC
Last seen:Never
File type: sh
MIME type:text/plain
ssdeep 12:dUOdU6yUiNIl5QUP0LKxUrMBWUuOYUAjqUc1UVSQU5eTt4VUWrUSMUn:TANI7GKcduuAyt4Bxn
TLSH T1F3010CEDF0F76453D4689D0870A284295118CFC93DE2CE9DEC5C18BA59F7920B155F4D
Magika asm
Reporter abuse_ch
Tags:sh
URLMalware sample (SHA256 hash)SignatureTags
http://158.94.208.27/arm4771b24ae004fa65a9df902619cca3f898abaae95961f8ea812198ecf8e4a049b Miraielf mirai
http://158.94.208.27/arm58030e5281c1e72014a3bc3e7068cc64a0530b4ba8362fb1969054e1e3a710ed3 Miraielf mirai
http://158.94.208.27/arm6b9c2427bebaeffeae0547962290a308f7a52cf0b97fc88386581817318c204c2 Miraielf mirai
http://158.94.208.27/arm7ffe7793c6ba162999cb894973c722f9d3281f2b8ab42eaec3b01d43a6dddf356 Miraielf mirai
http://158.94.208.27/i486bde8f13fae659528196f1f8e322b5e06602ec726968d101100fad5d6029b5986 Miraielf mirai ua-wget
http://158.94.208.27/m68k3bbea823483cb6e8b1a936e49bcd8e64dc053fb609c286e856329ce137e68b40 Miraielf mirai ua-wget
http://158.94.208.27/mips0f643d2119cf19d662d10e6573635e3386dbc33c76e8e5f5e57f87f66e67d596 Miraielf mirai ua-wget
http://158.94.208.27/mpslc23e13e7e3121a6abb9d64f221fef6e924457ea518f764818a5f4c4b1ac81afd Miraielf mirai
http://158.94.208.27/ppc1b180937282f7fbde92bc69749bbb9d92b560bdbd4a4644bee256ae23c60c3e8 Miraielf mirai
http://158.94.208.27/sh4cc830474d003e4c72b0e70d62acc544cadba12fc322200a889e0c751ed2493b2 Miraielf mirai ua-wget
http://158.94.208.27/x86d18c30c5f9ea7c1e66ba6fb7cd6b7ae26505871e47312206972b1cedddb8c1f4 Miraielf mirai
http://158.94.208.27/x86_64d15b5ed2f564ea1a42ed62ff047ddcff91cc8b1234cd056c78f77d6340efa6e7 Miraielf mirai ua-wget

Intelligence


File Origin
# of uploads :
1
# of downloads :
52
Origin country :
DE DE
Vendor Threat Intelligence
No detections
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
busybox mirai
Result
Gathering data
Verdict:
Malicious
File Type:
text
Detections:
HEUR:Trojan-Downloader.Shell.Agent.a
Status:
terminated
Behavior Graph:
%3 guuid=b711cf0a-1900-0000-39b2-0b0151120000 pid=4689 /usr/bin/sudo guuid=d6291b0d-1900-0000-39b2-0b015e120000 pid=4702 /tmp/sample.bin guuid=b711cf0a-1900-0000-39b2-0b0151120000 pid=4689->guuid=d6291b0d-1900-0000-39b2-0b015e120000 pid=4702 execve guuid=e2e75b0d-1900-0000-39b2-0b0160120000 pid=4704 /usr/bin/busybox net send-data write-file guuid=d6291b0d-1900-0000-39b2-0b015e120000 pid=4702->guuid=e2e75b0d-1900-0000-39b2-0b0160120000 pid=4704 execve guuid=7a371217-1900-0000-39b2-0b0175120000 pid=4725 /usr/bin/chmod guuid=d6291b0d-1900-0000-39b2-0b015e120000 pid=4702->guuid=7a371217-1900-0000-39b2-0b0175120000 pid=4725 execve guuid=38895617-1900-0000-39b2-0b0177120000 pid=4727 /usr/bin/dash guuid=d6291b0d-1900-0000-39b2-0b015e120000 pid=4702->guuid=38895617-1900-0000-39b2-0b0177120000 pid=4727 clone guuid=b3f7e317-1900-0000-39b2-0b017b120000 pid=4731 /usr/bin/busybox net send-data write-file guuid=d6291b0d-1900-0000-39b2-0b015e120000 pid=4702->guuid=b3f7e317-1900-0000-39b2-0b017b120000 pid=4731 execve guuid=f875e521-1900-0000-39b2-0b01a4120000 pid=4772 /usr/bin/chmod guuid=d6291b0d-1900-0000-39b2-0b015e120000 pid=4702->guuid=f875e521-1900-0000-39b2-0b01a4120000 pid=4772 execve guuid=073a1a22-1900-0000-39b2-0b01a6120000 pid=4774 /usr/bin/dash guuid=d6291b0d-1900-0000-39b2-0b015e120000 pid=4702->guuid=073a1a22-1900-0000-39b2-0b01a6120000 pid=4774 clone guuid=fb03ac23-1900-0000-39b2-0b01ae120000 pid=4782 /usr/bin/busybox net send-data write-file guuid=d6291b0d-1900-0000-39b2-0b015e120000 pid=4702->guuid=fb03ac23-1900-0000-39b2-0b01ae120000 pid=4782 execve guuid=b0e92030-1900-0000-39b2-0b01e6120000 pid=4838 /usr/bin/chmod guuid=d6291b0d-1900-0000-39b2-0b015e120000 pid=4702->guuid=b0e92030-1900-0000-39b2-0b01e6120000 pid=4838 execve guuid=124a5a30-1900-0000-39b2-0b01e8120000 pid=4840 /usr/bin/dash guuid=d6291b0d-1900-0000-39b2-0b015e120000 pid=4702->guuid=124a5a30-1900-0000-39b2-0b01e8120000 pid=4840 clone guuid=e32b1231-1900-0000-39b2-0b01ed120000 pid=4845 /usr/bin/busybox net send-data write-file guuid=d6291b0d-1900-0000-39b2-0b015e120000 pid=4702->guuid=e32b1231-1900-0000-39b2-0b01ed120000 pid=4845 execve guuid=3e54243e-1900-0000-39b2-0b011f130000 pid=4895 /usr/bin/chmod guuid=d6291b0d-1900-0000-39b2-0b015e120000 pid=4702->guuid=3e54243e-1900-0000-39b2-0b011f130000 pid=4895 execve guuid=0a639e3e-1900-0000-39b2-0b0121130000 pid=4897 /usr/bin/dash guuid=d6291b0d-1900-0000-39b2-0b015e120000 pid=4702->guuid=0a639e3e-1900-0000-39b2-0b0121130000 pid=4897 clone guuid=c304de3f-1900-0000-39b2-0b0126130000 pid=4902 /usr/bin/busybox net send-data write-file guuid=d6291b0d-1900-0000-39b2-0b015e120000 pid=4702->guuid=c304de3f-1900-0000-39b2-0b0126130000 pid=4902 execve guuid=36377f49-1900-0000-39b2-0b013d130000 pid=4925 /usr/bin/chmod guuid=d6291b0d-1900-0000-39b2-0b015e120000 pid=4702->guuid=36377f49-1900-0000-39b2-0b013d130000 pid=4925 execve guuid=ef9ada49-1900-0000-39b2-0b013f130000 pid=4927 /home/sandbox/i486 net guuid=d6291b0d-1900-0000-39b2-0b015e120000 pid=4702->guuid=ef9ada49-1900-0000-39b2-0b013f130000 pid=4927 execve guuid=0f01034a-1900-0000-39b2-0b0141130000 pid=4929 /usr/bin/busybox net send-data write-file guuid=d6291b0d-1900-0000-39b2-0b015e120000 pid=4702->guuid=0f01034a-1900-0000-39b2-0b0141130000 pid=4929 execve guuid=fb2c2954-1900-0000-39b2-0b0157130000 pid=4951 /usr/bin/chmod guuid=d6291b0d-1900-0000-39b2-0b015e120000 pid=4702->guuid=fb2c2954-1900-0000-39b2-0b0157130000 pid=4951 execve guuid=3345a254-1900-0000-39b2-0b0159130000 pid=4953 /usr/bin/dash guuid=d6291b0d-1900-0000-39b2-0b015e120000 pid=4702->guuid=3345a254-1900-0000-39b2-0b0159130000 pid=4953 clone guuid=8e31f856-1900-0000-39b2-0b015f130000 pid=4959 /usr/bin/busybox net send-data write-file guuid=d6291b0d-1900-0000-39b2-0b015e120000 pid=4702->guuid=8e31f856-1900-0000-39b2-0b015f130000 pid=4959 execve guuid=2518fd63-1900-0000-39b2-0b017c130000 pid=4988 /usr/bin/chmod guuid=d6291b0d-1900-0000-39b2-0b015e120000 pid=4702->guuid=2518fd63-1900-0000-39b2-0b017c130000 pid=4988 execve guuid=4ce85864-1900-0000-39b2-0b017e130000 pid=4990 /usr/bin/dash guuid=d6291b0d-1900-0000-39b2-0b015e120000 pid=4702->guuid=4ce85864-1900-0000-39b2-0b017e130000 pid=4990 clone guuid=2f250466-1900-0000-39b2-0b0183130000 pid=4995 /usr/bin/busybox net send-data write-file guuid=d6291b0d-1900-0000-39b2-0b015e120000 pid=4702->guuid=2f250466-1900-0000-39b2-0b0183130000 pid=4995 execve guuid=f805d178-1900-0000-39b2-0b0192130000 pid=5010 /usr/bin/chmod guuid=d6291b0d-1900-0000-39b2-0b015e120000 pid=4702->guuid=f805d178-1900-0000-39b2-0b0192130000 pid=5010 execve guuid=626a4779-1900-0000-39b2-0b0194130000 pid=5012 /usr/bin/dash guuid=d6291b0d-1900-0000-39b2-0b015e120000 pid=4702->guuid=626a4779-1900-0000-39b2-0b0194130000 pid=5012 clone guuid=9d46887b-1900-0000-39b2-0b019a130000 pid=5018 /usr/bin/busybox net send-data write-file guuid=d6291b0d-1900-0000-39b2-0b015e120000 pid=4702->guuid=9d46887b-1900-0000-39b2-0b019a130000 pid=5018 execve guuid=aa5cac85-1900-0000-39b2-0b01ac130000 pid=5036 /usr/bin/chmod guuid=d6291b0d-1900-0000-39b2-0b015e120000 pid=4702->guuid=aa5cac85-1900-0000-39b2-0b01ac130000 pid=5036 execve guuid=c4092f86-1900-0000-39b2-0b01ae130000 pid=5038 /usr/bin/dash guuid=d6291b0d-1900-0000-39b2-0b015e120000 pid=4702->guuid=c4092f86-1900-0000-39b2-0b01ae130000 pid=5038 clone guuid=0d3e5888-1900-0000-39b2-0b01b5130000 pid=5045 /usr/bin/busybox net send-data write-file guuid=d6291b0d-1900-0000-39b2-0b015e120000 pid=4702->guuid=0d3e5888-1900-0000-39b2-0b01b5130000 pid=5045 execve guuid=391a4f92-1900-0000-39b2-0b01d6130000 pid=5078 /usr/bin/chmod guuid=d6291b0d-1900-0000-39b2-0b015e120000 pid=4702->guuid=391a4f92-1900-0000-39b2-0b01d6130000 pid=5078 execve guuid=cbeabb92-1900-0000-39b2-0b01d8130000 pid=5080 /usr/bin/dash guuid=d6291b0d-1900-0000-39b2-0b015e120000 pid=4702->guuid=cbeabb92-1900-0000-39b2-0b01d8130000 pid=5080 clone guuid=61357294-1900-0000-39b2-0b01dd130000 pid=5085 /usr/bin/busybox net send-data write-file guuid=d6291b0d-1900-0000-39b2-0b015e120000 pid=4702->guuid=61357294-1900-0000-39b2-0b01dd130000 pid=5085 execve guuid=8ed37a9e-1900-0000-39b2-0b01f9130000 pid=5113 /usr/bin/chmod guuid=d6291b0d-1900-0000-39b2-0b015e120000 pid=4702->guuid=8ed37a9e-1900-0000-39b2-0b01f9130000 pid=5113 execve guuid=3509eb9e-1900-0000-39b2-0b01fd130000 pid=5117 /home/sandbox/x86 net guuid=d6291b0d-1900-0000-39b2-0b015e120000 pid=4702->guuid=3509eb9e-1900-0000-39b2-0b01fd130000 pid=5117 execve guuid=2144d5cf-1a00-0000-39b2-0b0190140000 pid=5264 /usr/bin/busybox net send-data write-file guuid=d6291b0d-1900-0000-39b2-0b015e120000 pid=4702->guuid=2144d5cf-1a00-0000-39b2-0b0190140000 pid=5264 execve guuid=950751da-1a00-0000-39b2-0b0191140000 pid=5265 /usr/bin/chmod guuid=d6291b0d-1900-0000-39b2-0b015e120000 pid=4702->guuid=950751da-1a00-0000-39b2-0b0191140000 pid=5265 execve guuid=e579f1da-1a00-0000-39b2-0b0192140000 pid=5266 /home/sandbox/x86_64 net guuid=d6291b0d-1900-0000-39b2-0b015e120000 pid=4702->guuid=e579f1da-1a00-0000-39b2-0b0192140000 pid=5266 execve guuid=512af605-1c00-0000-39b2-0b01a7140000 pid=5287 /usr/bin/rm delete-file guuid=d6291b0d-1900-0000-39b2-0b015e120000 pid=4702->guuid=512af605-1c00-0000-39b2-0b01a7140000 pid=5287 execve b8c32f6f-e0ff-5b69-a443-652e84386a76 158.94.208.27:80 guuid=e2e75b0d-1900-0000-39b2-0b0160120000 pid=4704->b8c32f6f-e0ff-5b69-a443-652e84386a76 send: 80B guuid=b3f7e317-1900-0000-39b2-0b017b120000 pid=4731->b8c32f6f-e0ff-5b69-a443-652e84386a76 send: 80B guuid=fb03ac23-1900-0000-39b2-0b01ae120000 pid=4782->b8c32f6f-e0ff-5b69-a443-652e84386a76 send: 80B guuid=e32b1231-1900-0000-39b2-0b01ed120000 pid=4845->b8c32f6f-e0ff-5b69-a443-652e84386a76 send: 80B guuid=c304de3f-1900-0000-39b2-0b0126130000 pid=4902->b8c32f6f-e0ff-5b69-a443-652e84386a76 send: 80B 8b0a01dc-0728-52c1-8024-c4ba7801b8d6 8.8.8.8:53 guuid=ef9ada49-1900-0000-39b2-0b013f130000 pid=4927->8b0a01dc-0728-52c1-8024-c4ba7801b8d6 con guuid=69f9f849-1900-0000-39b2-0b0140130000 pid=4928 /home/sandbox/i486 net send-data zombie guuid=ef9ada49-1900-0000-39b2-0b013f130000 pid=4927->guuid=69f9f849-1900-0000-39b2-0b0140130000 pid=4928 clone guuid=69f9f849-1900-0000-39b2-0b0140130000 pid=4928->8b0a01dc-0728-52c1-8024-c4ba7801b8d6 con cffce5d3-94d6-56f2-ab50-c17e9e202b24 193.29.187.173:38241 guuid=69f9f849-1900-0000-39b2-0b0140130000 pid=4928->cffce5d3-94d6-56f2-ab50-c17e9e202b24 send: 9B guuid=0f01034a-1900-0000-39b2-0b0141130000 pid=4929->b8c32f6f-e0ff-5b69-a443-652e84386a76 send: 80B guuid=8e31f856-1900-0000-39b2-0b015f130000 pid=4959->b8c32f6f-e0ff-5b69-a443-652e84386a76 send: 80B guuid=2f250466-1900-0000-39b2-0b0183130000 pid=4995->b8c32f6f-e0ff-5b69-a443-652e84386a76 send: 80B guuid=9d46887b-1900-0000-39b2-0b019a130000 pid=5018->b8c32f6f-e0ff-5b69-a443-652e84386a76 send: 79B guuid=0d3e5888-1900-0000-39b2-0b01b5130000 pid=5045->b8c32f6f-e0ff-5b69-a443-652e84386a76 send: 79B guuid=61357294-1900-0000-39b2-0b01dd130000 pid=5085->b8c32f6f-e0ff-5b69-a443-652e84386a76 send: 79B guuid=3509eb9e-1900-0000-39b2-0b01fd130000 pid=5117->8b0a01dc-0728-52c1-8024-c4ba7801b8d6 con 4945e811-daa2-5999-bd89-4cdaa6badb43 0.0.0.0:8345 guuid=3509eb9e-1900-0000-39b2-0b01fd130000 pid=5117->4945e811-daa2-5999-bd89-4cdaa6badb43 con guuid=2093cdcf-1a00-0000-39b2-0b018f140000 pid=5263 /home/sandbox/x86 net send-data zombie guuid=3509eb9e-1900-0000-39b2-0b01fd130000 pid=5117->guuid=2093cdcf-1a00-0000-39b2-0b018f140000 pid=5263 clone guuid=2093cdcf-1a00-0000-39b2-0b018f140000 pid=5263->8b0a01dc-0728-52c1-8024-c4ba7801b8d6 con guuid=2093cdcf-1a00-0000-39b2-0b018f140000 pid=5263->cffce5d3-94d6-56f2-ab50-c17e9e202b24 send: 9B guuid=2144d5cf-1a00-0000-39b2-0b0190140000 pid=5264->b8c32f6f-e0ff-5b69-a443-652e84386a76 send: 82B guuid=e579f1da-1a00-0000-39b2-0b0192140000 pid=5266->8b0a01dc-0728-52c1-8024-c4ba7801b8d6 con guuid=e579f1da-1a00-0000-39b2-0b0192140000 pid=5266->4945e811-daa2-5999-bd89-4cdaa6badb43 con guuid=faa0e605-1c00-0000-39b2-0b01a6140000 pid=5286 /home/sandbox/x86_64 net send-data zombie guuid=e579f1da-1a00-0000-39b2-0b0192140000 pid=5266->guuid=faa0e605-1c00-0000-39b2-0b01a6140000 pid=5286 clone guuid=faa0e605-1c00-0000-39b2-0b01a6140000 pid=5286->8b0a01dc-0728-52c1-8024-c4ba7801b8d6 con guuid=faa0e605-1c00-0000-39b2-0b01a6140000 pid=5286->cffce5d3-94d6-56f2-ab50-c17e9e202b24 send: 11B
Verdict:
Malicious
Threat:
Trojan-Downloader.Shell.Agent
Threat name:
Document-HTML.Worm.Mirai
Status:
Malicious
First seen:
2026-01-13 01:32:17 UTC
File Type:
Text (Shell)
AV detection:
14 of 36 (38.89%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Modifies registry class
Suspicious use of SetWindowsHookEx
Enumerates physical storage devices
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:MAL_Linux_IoT_MultiArch_BotnetLoader_Generic
Author:Anish Bogati
Description:Technique-based detection of IoT/Linux botnet loader shell scripts downloading binaries from numeric IPs, chmodding, and executing multi-architecture payloads
Reference:MalwareBazaar sample lilin.sh

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh 2d5e2d77ba36d07dd6099b9cb0247242d489d2255b57f9f2290f2cdaa35f9ba2

(this sample)

  
Delivery method
Distributed via web download

Comments