MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 2d5e2d77ba36d07dd6099b9cb0247242d489d2255b57f9f2290f2cdaa35f9ba2. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 7


Intelligence 7 IOCs YARA 1 File information Comments

SHA256 hash: 2d5e2d77ba36d07dd6099b9cb0247242d489d2255b57f9f2290f2cdaa35f9ba2
SHA3-384 hash: 9fcae4ff7321f93d541886885c46edafac36687c4d32098f8cbb7d52358628981ff358c9d292e9a1de61de44f298dfea
SHA1 hash: 7506f63e27a13e05987bd5d0103448985c58d4e9
MD5 hash: 8151d17630d89d6a5a235c1d3b6cf9e4
humanhash: arizona-london-pasta-beryllium
File name:w.sh
Download: download sample
Signature Mirai
File size:819 bytes
First seen:2026-01-13 01:31:20 UTC
Last seen:Never
File type: sh
MIME type:text/plain
ssdeep 12:dUOdU6yUiNIl5QUP0LKxUrMBWUuOYUAjqUc1UVSQU5eTt4VUWrUSMUn:TANI7GKcduuAyt4Bxn
TLSH T1F3010CEDF0F76453D4689D0870A284295118CFC93DE2CE9DEC5C18BA59F7920B155F4D
Magika asm
Reporter abuse_ch
Tags:sh
URLMalware sample (SHA256 hash)SignatureTags
http://158.94.208.27/arm4fe75d377cef1bc619904f107a1686c914340532dab020a53d99de4ac68ced47a Miraielf mirai
http://158.94.208.27/arm5cc1d3e676b7a1f8a2957593809741e305b53175206970f9e92aed74a20a077d8 Miraielf mirai
http://158.94.208.27/arm627fe5bc4522c12b8bb62e916fcbc21de3e252621a06b1ca01c5ff04fb542cc9f Miraielf mirai
http://158.94.208.27/arm789e1474abd79dbfed5c1f4f47150d8a1da3ff02c01f3ffd79aeafb1a7d0a21f3 Miraielf mirai
http://158.94.208.27/i4865ff3c45bba93b2c297d9644a93a751a7be92ab99699964b871f28edbc3c09404 Miraielf mirai ua-wget
http://158.94.208.27/m68k2beaf13e5bc6678b22cf23407999b1bdee27ada1b5219bf6227279cd97c833ba Miraielf mirai ua-wget
http://158.94.208.27/mips2e3e7be8d40ee0b3614553d271ae3570c91e28e1c92a4cc87cfad2d74916f8c4 Miraielf mirai ua-wget
http://158.94.208.27/mpsl0bbb7ae0a2495f87a81b3d7c8a458dcf45cc568917e32f0d14a7a1335dd2d5ca Miraielf mirai
http://158.94.208.27/ppc3e96982bfb873576513d8fa107ca433003b86c8cf901120f20237cf38cf485e1 Miraielf mirai
http://158.94.208.27/sh4354bac86d50cf576c6d554b2aafd6f728e032821010ec59741c9f00ebf6a89ab Miraielf mirai ua-wget
http://158.94.208.27/x8628e9a3fee5786f96a02170a4959f7250101feaed551e27b146cd5f27a6b70f2c Miraielf mirai
http://158.94.208.27/x86_648b8f4ab153e1ad148a17077606bc108a4c8cf3122125f5cc61a733c5c68f34ec Miraielf mirai ua-wget

Intelligence


File Origin
# of uploads :
1
# of downloads :
74
Origin country :
DE DE
Vendor Threat Intelligence
No detections
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
busybox mirai
Verdict:
Malicious
File Type:
text
First seen:
2026-01-12T22:39:00Z UTC
Last seen:
2026-01-12T22:53:00Z UTC
Hits:
~10
Detections:
HEUR:Trojan-Downloader.Shell.Agent.a
Status:
terminated
Behavior Graph:
%3 guuid=b711cf0a-1900-0000-39b2-0b0151120000 pid=4689 /usr/bin/sudo guuid=d6291b0d-1900-0000-39b2-0b015e120000 pid=4702 /tmp/sample.bin guuid=b711cf0a-1900-0000-39b2-0b0151120000 pid=4689->guuid=d6291b0d-1900-0000-39b2-0b015e120000 pid=4702 execve guuid=e2e75b0d-1900-0000-39b2-0b0160120000 pid=4704 /usr/bin/busybox net send-data write-file guuid=d6291b0d-1900-0000-39b2-0b015e120000 pid=4702->guuid=e2e75b0d-1900-0000-39b2-0b0160120000 pid=4704 execve guuid=7a371217-1900-0000-39b2-0b0175120000 pid=4725 /usr/bin/chmod guuid=d6291b0d-1900-0000-39b2-0b015e120000 pid=4702->guuid=7a371217-1900-0000-39b2-0b0175120000 pid=4725 execve guuid=38895617-1900-0000-39b2-0b0177120000 pid=4727 /usr/bin/dash guuid=d6291b0d-1900-0000-39b2-0b015e120000 pid=4702->guuid=38895617-1900-0000-39b2-0b0177120000 pid=4727 clone guuid=b3f7e317-1900-0000-39b2-0b017b120000 pid=4731 /usr/bin/busybox net send-data write-file guuid=d6291b0d-1900-0000-39b2-0b015e120000 pid=4702->guuid=b3f7e317-1900-0000-39b2-0b017b120000 pid=4731 execve guuid=f875e521-1900-0000-39b2-0b01a4120000 pid=4772 /usr/bin/chmod guuid=d6291b0d-1900-0000-39b2-0b015e120000 pid=4702->guuid=f875e521-1900-0000-39b2-0b01a4120000 pid=4772 execve guuid=073a1a22-1900-0000-39b2-0b01a6120000 pid=4774 /usr/bin/dash guuid=d6291b0d-1900-0000-39b2-0b015e120000 pid=4702->guuid=073a1a22-1900-0000-39b2-0b01a6120000 pid=4774 clone guuid=fb03ac23-1900-0000-39b2-0b01ae120000 pid=4782 /usr/bin/busybox net send-data write-file guuid=d6291b0d-1900-0000-39b2-0b015e120000 pid=4702->guuid=fb03ac23-1900-0000-39b2-0b01ae120000 pid=4782 execve guuid=b0e92030-1900-0000-39b2-0b01e6120000 pid=4838 /usr/bin/chmod guuid=d6291b0d-1900-0000-39b2-0b015e120000 pid=4702->guuid=b0e92030-1900-0000-39b2-0b01e6120000 pid=4838 execve guuid=124a5a30-1900-0000-39b2-0b01e8120000 pid=4840 /usr/bin/dash guuid=d6291b0d-1900-0000-39b2-0b015e120000 pid=4702->guuid=124a5a30-1900-0000-39b2-0b01e8120000 pid=4840 clone guuid=e32b1231-1900-0000-39b2-0b01ed120000 pid=4845 /usr/bin/busybox net send-data write-file guuid=d6291b0d-1900-0000-39b2-0b015e120000 pid=4702->guuid=e32b1231-1900-0000-39b2-0b01ed120000 pid=4845 execve guuid=3e54243e-1900-0000-39b2-0b011f130000 pid=4895 /usr/bin/chmod guuid=d6291b0d-1900-0000-39b2-0b015e120000 pid=4702->guuid=3e54243e-1900-0000-39b2-0b011f130000 pid=4895 execve guuid=0a639e3e-1900-0000-39b2-0b0121130000 pid=4897 /usr/bin/dash guuid=d6291b0d-1900-0000-39b2-0b015e120000 pid=4702->guuid=0a639e3e-1900-0000-39b2-0b0121130000 pid=4897 clone guuid=c304de3f-1900-0000-39b2-0b0126130000 pid=4902 /usr/bin/busybox net send-data write-file guuid=d6291b0d-1900-0000-39b2-0b015e120000 pid=4702->guuid=c304de3f-1900-0000-39b2-0b0126130000 pid=4902 execve guuid=36377f49-1900-0000-39b2-0b013d130000 pid=4925 /usr/bin/chmod guuid=d6291b0d-1900-0000-39b2-0b015e120000 pid=4702->guuid=36377f49-1900-0000-39b2-0b013d130000 pid=4925 execve guuid=ef9ada49-1900-0000-39b2-0b013f130000 pid=4927 /home/sandbox/i486 net guuid=d6291b0d-1900-0000-39b2-0b015e120000 pid=4702->guuid=ef9ada49-1900-0000-39b2-0b013f130000 pid=4927 execve guuid=0f01034a-1900-0000-39b2-0b0141130000 pid=4929 /usr/bin/busybox net send-data write-file guuid=d6291b0d-1900-0000-39b2-0b015e120000 pid=4702->guuid=0f01034a-1900-0000-39b2-0b0141130000 pid=4929 execve guuid=fb2c2954-1900-0000-39b2-0b0157130000 pid=4951 /usr/bin/chmod guuid=d6291b0d-1900-0000-39b2-0b015e120000 pid=4702->guuid=fb2c2954-1900-0000-39b2-0b0157130000 pid=4951 execve guuid=3345a254-1900-0000-39b2-0b0159130000 pid=4953 /usr/bin/dash guuid=d6291b0d-1900-0000-39b2-0b015e120000 pid=4702->guuid=3345a254-1900-0000-39b2-0b0159130000 pid=4953 clone guuid=8e31f856-1900-0000-39b2-0b015f130000 pid=4959 /usr/bin/busybox net send-data write-file guuid=d6291b0d-1900-0000-39b2-0b015e120000 pid=4702->guuid=8e31f856-1900-0000-39b2-0b015f130000 pid=4959 execve guuid=2518fd63-1900-0000-39b2-0b017c130000 pid=4988 /usr/bin/chmod guuid=d6291b0d-1900-0000-39b2-0b015e120000 pid=4702->guuid=2518fd63-1900-0000-39b2-0b017c130000 pid=4988 execve guuid=4ce85864-1900-0000-39b2-0b017e130000 pid=4990 /usr/bin/dash guuid=d6291b0d-1900-0000-39b2-0b015e120000 pid=4702->guuid=4ce85864-1900-0000-39b2-0b017e130000 pid=4990 clone guuid=2f250466-1900-0000-39b2-0b0183130000 pid=4995 /usr/bin/busybox net send-data write-file guuid=d6291b0d-1900-0000-39b2-0b015e120000 pid=4702->guuid=2f250466-1900-0000-39b2-0b0183130000 pid=4995 execve guuid=f805d178-1900-0000-39b2-0b0192130000 pid=5010 /usr/bin/chmod guuid=d6291b0d-1900-0000-39b2-0b015e120000 pid=4702->guuid=f805d178-1900-0000-39b2-0b0192130000 pid=5010 execve guuid=626a4779-1900-0000-39b2-0b0194130000 pid=5012 /usr/bin/dash guuid=d6291b0d-1900-0000-39b2-0b015e120000 pid=4702->guuid=626a4779-1900-0000-39b2-0b0194130000 pid=5012 clone guuid=9d46887b-1900-0000-39b2-0b019a130000 pid=5018 /usr/bin/busybox net send-data write-file guuid=d6291b0d-1900-0000-39b2-0b015e120000 pid=4702->guuid=9d46887b-1900-0000-39b2-0b019a130000 pid=5018 execve guuid=aa5cac85-1900-0000-39b2-0b01ac130000 pid=5036 /usr/bin/chmod guuid=d6291b0d-1900-0000-39b2-0b015e120000 pid=4702->guuid=aa5cac85-1900-0000-39b2-0b01ac130000 pid=5036 execve guuid=c4092f86-1900-0000-39b2-0b01ae130000 pid=5038 /usr/bin/dash guuid=d6291b0d-1900-0000-39b2-0b015e120000 pid=4702->guuid=c4092f86-1900-0000-39b2-0b01ae130000 pid=5038 clone guuid=0d3e5888-1900-0000-39b2-0b01b5130000 pid=5045 /usr/bin/busybox net send-data write-file guuid=d6291b0d-1900-0000-39b2-0b015e120000 pid=4702->guuid=0d3e5888-1900-0000-39b2-0b01b5130000 pid=5045 execve guuid=391a4f92-1900-0000-39b2-0b01d6130000 pid=5078 /usr/bin/chmod guuid=d6291b0d-1900-0000-39b2-0b015e120000 pid=4702->guuid=391a4f92-1900-0000-39b2-0b01d6130000 pid=5078 execve guuid=cbeabb92-1900-0000-39b2-0b01d8130000 pid=5080 /usr/bin/dash guuid=d6291b0d-1900-0000-39b2-0b015e120000 pid=4702->guuid=cbeabb92-1900-0000-39b2-0b01d8130000 pid=5080 clone guuid=61357294-1900-0000-39b2-0b01dd130000 pid=5085 /usr/bin/busybox net send-data write-file guuid=d6291b0d-1900-0000-39b2-0b015e120000 pid=4702->guuid=61357294-1900-0000-39b2-0b01dd130000 pid=5085 execve guuid=8ed37a9e-1900-0000-39b2-0b01f9130000 pid=5113 /usr/bin/chmod guuid=d6291b0d-1900-0000-39b2-0b015e120000 pid=4702->guuid=8ed37a9e-1900-0000-39b2-0b01f9130000 pid=5113 execve guuid=3509eb9e-1900-0000-39b2-0b01fd130000 pid=5117 /home/sandbox/x86 net guuid=d6291b0d-1900-0000-39b2-0b015e120000 pid=4702->guuid=3509eb9e-1900-0000-39b2-0b01fd130000 pid=5117 execve guuid=2144d5cf-1a00-0000-39b2-0b0190140000 pid=5264 /usr/bin/busybox net send-data write-file guuid=d6291b0d-1900-0000-39b2-0b015e120000 pid=4702->guuid=2144d5cf-1a00-0000-39b2-0b0190140000 pid=5264 execve guuid=950751da-1a00-0000-39b2-0b0191140000 pid=5265 /usr/bin/chmod guuid=d6291b0d-1900-0000-39b2-0b015e120000 pid=4702->guuid=950751da-1a00-0000-39b2-0b0191140000 pid=5265 execve guuid=e579f1da-1a00-0000-39b2-0b0192140000 pid=5266 /home/sandbox/x86_64 net guuid=d6291b0d-1900-0000-39b2-0b015e120000 pid=4702->guuid=e579f1da-1a00-0000-39b2-0b0192140000 pid=5266 execve guuid=512af605-1c00-0000-39b2-0b01a7140000 pid=5287 /usr/bin/rm delete-file guuid=d6291b0d-1900-0000-39b2-0b015e120000 pid=4702->guuid=512af605-1c00-0000-39b2-0b01a7140000 pid=5287 execve b8c32f6f-e0ff-5b69-a443-652e84386a76 158.94.208.27:80 guuid=e2e75b0d-1900-0000-39b2-0b0160120000 pid=4704->b8c32f6f-e0ff-5b69-a443-652e84386a76 send: 80B guuid=b3f7e317-1900-0000-39b2-0b017b120000 pid=4731->b8c32f6f-e0ff-5b69-a443-652e84386a76 send: 80B guuid=fb03ac23-1900-0000-39b2-0b01ae120000 pid=4782->b8c32f6f-e0ff-5b69-a443-652e84386a76 send: 80B guuid=e32b1231-1900-0000-39b2-0b01ed120000 pid=4845->b8c32f6f-e0ff-5b69-a443-652e84386a76 send: 80B guuid=c304de3f-1900-0000-39b2-0b0126130000 pid=4902->b8c32f6f-e0ff-5b69-a443-652e84386a76 send: 80B 8b0a01dc-0728-52c1-8024-c4ba7801b8d6 8.8.8.8:53 guuid=ef9ada49-1900-0000-39b2-0b013f130000 pid=4927->8b0a01dc-0728-52c1-8024-c4ba7801b8d6 con guuid=69f9f849-1900-0000-39b2-0b0140130000 pid=4928 /home/sandbox/i486 net send-data zombie guuid=ef9ada49-1900-0000-39b2-0b013f130000 pid=4927->guuid=69f9f849-1900-0000-39b2-0b0140130000 pid=4928 clone guuid=69f9f849-1900-0000-39b2-0b0140130000 pid=4928->8b0a01dc-0728-52c1-8024-c4ba7801b8d6 con cffce5d3-94d6-56f2-ab50-c17e9e202b24 193.29.187.173:38241 guuid=69f9f849-1900-0000-39b2-0b0140130000 pid=4928->cffce5d3-94d6-56f2-ab50-c17e9e202b24 send: 9B guuid=0f01034a-1900-0000-39b2-0b0141130000 pid=4929->b8c32f6f-e0ff-5b69-a443-652e84386a76 send: 80B guuid=8e31f856-1900-0000-39b2-0b015f130000 pid=4959->b8c32f6f-e0ff-5b69-a443-652e84386a76 send: 80B guuid=2f250466-1900-0000-39b2-0b0183130000 pid=4995->b8c32f6f-e0ff-5b69-a443-652e84386a76 send: 80B guuid=9d46887b-1900-0000-39b2-0b019a130000 pid=5018->b8c32f6f-e0ff-5b69-a443-652e84386a76 send: 79B guuid=0d3e5888-1900-0000-39b2-0b01b5130000 pid=5045->b8c32f6f-e0ff-5b69-a443-652e84386a76 send: 79B guuid=61357294-1900-0000-39b2-0b01dd130000 pid=5085->b8c32f6f-e0ff-5b69-a443-652e84386a76 send: 79B guuid=3509eb9e-1900-0000-39b2-0b01fd130000 pid=5117->8b0a01dc-0728-52c1-8024-c4ba7801b8d6 con 4945e811-daa2-5999-bd89-4cdaa6badb43 0.0.0.0:8345 guuid=3509eb9e-1900-0000-39b2-0b01fd130000 pid=5117->4945e811-daa2-5999-bd89-4cdaa6badb43 con guuid=2093cdcf-1a00-0000-39b2-0b018f140000 pid=5263 /home/sandbox/x86 net send-data zombie guuid=3509eb9e-1900-0000-39b2-0b01fd130000 pid=5117->guuid=2093cdcf-1a00-0000-39b2-0b018f140000 pid=5263 clone guuid=2093cdcf-1a00-0000-39b2-0b018f140000 pid=5263->8b0a01dc-0728-52c1-8024-c4ba7801b8d6 con guuid=2093cdcf-1a00-0000-39b2-0b018f140000 pid=5263->cffce5d3-94d6-56f2-ab50-c17e9e202b24 send: 9B guuid=2144d5cf-1a00-0000-39b2-0b0190140000 pid=5264->b8c32f6f-e0ff-5b69-a443-652e84386a76 send: 82B guuid=e579f1da-1a00-0000-39b2-0b0192140000 pid=5266->8b0a01dc-0728-52c1-8024-c4ba7801b8d6 con guuid=e579f1da-1a00-0000-39b2-0b0192140000 pid=5266->4945e811-daa2-5999-bd89-4cdaa6badb43 con guuid=faa0e605-1c00-0000-39b2-0b01a6140000 pid=5286 /home/sandbox/x86_64 net send-data zombie guuid=e579f1da-1a00-0000-39b2-0b0192140000 pid=5266->guuid=faa0e605-1c00-0000-39b2-0b01a6140000 pid=5286 clone guuid=faa0e605-1c00-0000-39b2-0b01a6140000 pid=5286->8b0a01dc-0728-52c1-8024-c4ba7801b8d6 con guuid=faa0e605-1c00-0000-39b2-0b01a6140000 pid=5286->cffce5d3-94d6-56f2-ab50-c17e9e202b24 send: 11B
Verdict:
Malicious
Threat:
Trojan-Downloader.Shell.Agent
Threat name:
Document-HTML.Worm.Mirai
Status:
Malicious
First seen:
2026-01-13 01:32:17 UTC
File Type:
Text (Shell)
AV detection:
15 of 36 (41.67%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Modifies registry class
Suspicious use of SetWindowsHookEx
Enumerates physical storage devices
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:MAL_Linux_IoT_MultiArch_BotnetLoader_Generic
Author:Anish Bogati
Description:Technique-based detection of IoT/Linux botnet loader shell scripts downloading binaries from numeric IPs, chmodding, and executing multi-architecture payloads
Reference:MalwareBazaar sample lilin.sh

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh 2d5e2d77ba36d07dd6099b9cb0247242d489d2255b57f9f2290f2cdaa35f9ba2

(this sample)

  
Delivery method
Distributed via web download

Comments