MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 3046a730c53d084e825493abb25e7d7ec1e65c5d13f941f62f8e5fef71f8eda7. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 7


Intelligence 7 IOCs YARA 1 File information Comments

SHA256 hash: 3046a730c53d084e825493abb25e7d7ec1e65c5d13f941f62f8e5fef71f8eda7
SHA3-384 hash: 5b55e7d8bc8afd07f8b647f79abf15c51e93df69f8e0d4ffed9878c53a87c23843580b2a908bee4ac7117973705f84e0
SHA1 hash: 55eddd4b2835e51406d753326148948e36057366
MD5 hash: 83e48641d2e62e3e7f2623aea869920d
humanhash: hotel-alabama-lithium-spring
File name:w.sh
Download: download sample
Signature Mirai
File size:989 bytes
First seen:2026-01-02 02:00:48 UTC
Last seen:2026-01-02 07:47:11 UTC
File type: sh
MIME type:text/plain
ssdeep 24:DRDNAR3hURhNIRRxKuAbKnY/ZLACgLtFA3lsDdKA:l583hI6xqFLejDV
TLSH T13411E4EF70601A7205CC4F4872B2980CF8448AC591F65FAD5EDD04BB5FC6B14B798AB4
Magika shell
Reporter abuse_ch
Tags:sh
URLMalware sample (SHA256 hash)SignatureTags
http://130.12.180.20:36695/arm41ac2472a7266925354978d482153be974077046d46a8126b9fbd19bd4646eab2 Miraiarm elf geofenced mirai ua-wget USA
http://130.12.180.20:36695/arm5645e42550a44d8d0e0a2abe2b214eed4a608425b4107b9eac8d13a3121f1971a Miraiarm elf geofenced mirai ua-wget USA
http://130.12.180.20:36695/arm689d0c7f66ee96d3d02258a2369e482376291517e3d383a3fb2364ec8abbca6af Miraiarm elf geofenced mirai ua-wget USA
http://130.12.180.20:36695/arm75f522e269bf35cf78d80e6341ec953775adbffaf35871f710255f81d5ca0723c Miraiarm elf geofenced mirai ua-wget USA
http://130.12.180.20:36695/m68k4dae9f444d6d484da953f928ac5ea4ddd9c556e54fed41146d5059183d18fa54 Miraielf geofenced m68k mirai ua-wget USA
http://130.12.180.20:36695/mips115ba7461c23928d82557c16bf70b0b1b06d0dcec8a28622463d349ee696d4b0 Miraielf gafgyt geofenced mips mirai ua-wget USA
http://130.12.180.20:36695/mpslfcc742b8f1948c436d4c9037b8cc2aae0200714fd8d4bad28f87a6b45f718603 Miraielf geofenced mips mirai ua-wget USA
http://130.12.180.20:36695/ppcd3a33ffcb6fda21a7452f7507449b038465aa7fc48087839a7c7efe7c523d6c8 Miraielf geofenced mirai PowerPC ua-wget USA
http://130.12.180.20:36695/sh4b69541b3230b41bb3c596fba4f79aa8b0cec4d67c147597f74412f44f395c43a Miraielf geofenced mirai SuperH ua-wget USA
http://130.12.180.20:36695/spceffa5b76a489de0777fda6ea9c1fd46699987377bada094c570001adc2df5fa9 Miraielf geofenced mirai sparc ua-wget USA
http://130.12.180.20:36695/x8675cb064f489b12d4130786e1aa6963dfa2fc9de82b8d3b2150385ce9d65d27dc Miraielf geofenced mirai ua-wget USA x86
http://130.12.180.20:36695/x86_64b6db8bb39c7305a6a0a1024ab9b51e7d7b4c016455865504909644b4381ede78 Miraielf geofenced mirai ua-wget USA x86

Intelligence


File Origin
# of uploads :
2
# of downloads :
60
Origin country :
DE DE
Vendor Threat Intelligence
No detections
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
busybox evasive mirai
Verdict:
Malicious
File Type:
ps1
First seen:
2026-01-01T18:09:00Z UTC
Last seen:
2026-01-03T03:39:00Z UTC
Hits:
~10
Detections:
HEUR:Trojan-Downloader.Shell.Agent.p HEUR:Trojan-Downloader.Shell.Agent.a
Status:
terminated
Behavior Graph:
%3 guuid=6aaf2721-1900-0000-ea42-38efb00b0000 pid=2992 /usr/bin/sudo guuid=44d49c23-1900-0000-ea42-38efb40b0000 pid=2996 /tmp/sample.bin guuid=6aaf2721-1900-0000-ea42-38efb00b0000 pid=2992->guuid=44d49c23-1900-0000-ea42-38efb40b0000 pid=2996 execve guuid=ddface23-1900-0000-ea42-38efb60b0000 pid=2998 /usr/bin/rm guuid=44d49c23-1900-0000-ea42-38efb40b0000 pid=2996->guuid=ddface23-1900-0000-ea42-38efb60b0000 pid=2998 execve guuid=37975624-1900-0000-ea42-38efb90b0000 pid=3001 /usr/bin/busybox net send-data write-file guuid=44d49c23-1900-0000-ea42-38efb40b0000 pid=2996->guuid=37975624-1900-0000-ea42-38efb90b0000 pid=3001 execve guuid=2e172c28-1900-0000-ea42-38efc10b0000 pid=3009 /usr/bin/chmod guuid=44d49c23-1900-0000-ea42-38efb40b0000 pid=2996->guuid=2e172c28-1900-0000-ea42-38efc10b0000 pid=3009 execve guuid=0e6c9328-1900-0000-ea42-38efc20b0000 pid=3010 /usr/bin/dash guuid=44d49c23-1900-0000-ea42-38efb40b0000 pid=2996->guuid=0e6c9328-1900-0000-ea42-38efc20b0000 pid=3010 clone guuid=c971c128-1900-0000-ea42-38efc30b0000 pid=3011 /usr/bin/rm guuid=44d49c23-1900-0000-ea42-38efb40b0000 pid=2996->guuid=c971c128-1900-0000-ea42-38efc30b0000 pid=3011 execve guuid=67871429-1900-0000-ea42-38efc50b0000 pid=3013 /usr/bin/busybox net send-data write-file guuid=44d49c23-1900-0000-ea42-38efb40b0000 pid=2996->guuid=67871429-1900-0000-ea42-38efc50b0000 pid=3013 execve guuid=a757ad2c-1900-0000-ea42-38efd00b0000 pid=3024 /usr/bin/chmod guuid=44d49c23-1900-0000-ea42-38efb40b0000 pid=2996->guuid=a757ad2c-1900-0000-ea42-38efd00b0000 pid=3024 execve guuid=c8ae102d-1900-0000-ea42-38efd20b0000 pid=3026 /usr/bin/dash guuid=44d49c23-1900-0000-ea42-38efb40b0000 pid=2996->guuid=c8ae102d-1900-0000-ea42-38efd20b0000 pid=3026 clone guuid=f773282d-1900-0000-ea42-38efd30b0000 pid=3027 /usr/bin/rm guuid=44d49c23-1900-0000-ea42-38efb40b0000 pid=2996->guuid=f773282d-1900-0000-ea42-38efd30b0000 pid=3027 execve guuid=cf14652d-1900-0000-ea42-38efd50b0000 pid=3029 /usr/bin/busybox net send-data write-file guuid=44d49c23-1900-0000-ea42-38efb40b0000 pid=2996->guuid=cf14652d-1900-0000-ea42-38efd50b0000 pid=3029 execve guuid=2ce81431-1900-0000-ea42-38efe10b0000 pid=3041 /usr/bin/chmod guuid=44d49c23-1900-0000-ea42-38efb40b0000 pid=2996->guuid=2ce81431-1900-0000-ea42-38efe10b0000 pid=3041 execve guuid=0f0e7031-1900-0000-ea42-38efe30b0000 pid=3043 /usr/bin/dash guuid=44d49c23-1900-0000-ea42-38efb40b0000 pid=2996->guuid=0f0e7031-1900-0000-ea42-38efe30b0000 pid=3043 clone guuid=ed868031-1900-0000-ea42-38efe50b0000 pid=3045 /usr/bin/rm guuid=44d49c23-1900-0000-ea42-38efb40b0000 pid=2996->guuid=ed868031-1900-0000-ea42-38efe50b0000 pid=3045 execve guuid=f53abd31-1900-0000-ea42-38efe60b0000 pid=3046 /usr/bin/busybox net send-data write-file guuid=44d49c23-1900-0000-ea42-38efb40b0000 pid=2996->guuid=f53abd31-1900-0000-ea42-38efe60b0000 pid=3046 execve guuid=f5687b35-1900-0000-ea42-38eff20b0000 pid=3058 /usr/bin/chmod guuid=44d49c23-1900-0000-ea42-38efb40b0000 pid=2996->guuid=f5687b35-1900-0000-ea42-38eff20b0000 pid=3058 execve guuid=fee9cc35-1900-0000-ea42-38eff40b0000 pid=3060 /usr/bin/dash guuid=44d49c23-1900-0000-ea42-38efb40b0000 pid=2996->guuid=fee9cc35-1900-0000-ea42-38eff40b0000 pid=3060 clone guuid=954cda35-1900-0000-ea42-38eff50b0000 pid=3061 /usr/bin/rm guuid=44d49c23-1900-0000-ea42-38efb40b0000 pid=2996->guuid=954cda35-1900-0000-ea42-38eff50b0000 pid=3061 execve guuid=d69e1936-1900-0000-ea42-38eff70b0000 pid=3063 /usr/bin/busybox net send-data write-file guuid=44d49c23-1900-0000-ea42-38efb40b0000 pid=2996->guuid=d69e1936-1900-0000-ea42-38eff70b0000 pid=3063 execve guuid=6547ce39-1900-0000-ea42-38ef050c0000 pid=3077 /usr/bin/chmod guuid=44d49c23-1900-0000-ea42-38efb40b0000 pid=2996->guuid=6547ce39-1900-0000-ea42-38ef050c0000 pid=3077 execve guuid=c7a9263a-1900-0000-ea42-38ef070c0000 pid=3079 /usr/bin/dash guuid=44d49c23-1900-0000-ea42-38efb40b0000 pid=2996->guuid=c7a9263a-1900-0000-ea42-38ef070c0000 pid=3079 clone guuid=ee39333a-1900-0000-ea42-38ef080c0000 pid=3080 /usr/bin/rm guuid=44d49c23-1900-0000-ea42-38efb40b0000 pid=2996->guuid=ee39333a-1900-0000-ea42-38ef080c0000 pid=3080 execve guuid=086e713a-1900-0000-ea42-38ef0a0c0000 pid=3082 /usr/bin/busybox net send-data write-file guuid=44d49c23-1900-0000-ea42-38efb40b0000 pid=2996->guuid=086e713a-1900-0000-ea42-38ef0a0c0000 pid=3082 execve guuid=a344323e-1900-0000-ea42-38ef110c0000 pid=3089 /usr/bin/chmod guuid=44d49c23-1900-0000-ea42-38efb40b0000 pid=2996->guuid=a344323e-1900-0000-ea42-38ef110c0000 pid=3089 execve guuid=92aa7d3e-1900-0000-ea42-38ef130c0000 pid=3091 /usr/bin/dash guuid=44d49c23-1900-0000-ea42-38efb40b0000 pid=2996->guuid=92aa7d3e-1900-0000-ea42-38ef130c0000 pid=3091 clone guuid=c5c18d3e-1900-0000-ea42-38ef150c0000 pid=3093 /usr/bin/rm guuid=44d49c23-1900-0000-ea42-38efb40b0000 pid=2996->guuid=c5c18d3e-1900-0000-ea42-38ef150c0000 pid=3093 execve guuid=bd93f43e-1900-0000-ea42-38ef170c0000 pid=3095 /usr/bin/busybox net send-data write-file guuid=44d49c23-1900-0000-ea42-38efb40b0000 pid=2996->guuid=bd93f43e-1900-0000-ea42-38ef170c0000 pid=3095 execve guuid=502dca42-1900-0000-ea42-38ef200c0000 pid=3104 /usr/bin/chmod guuid=44d49c23-1900-0000-ea42-38efb40b0000 pid=2996->guuid=502dca42-1900-0000-ea42-38ef200c0000 pid=3104 execve guuid=ca9a2643-1900-0000-ea42-38ef210c0000 pid=3105 /usr/bin/dash guuid=44d49c23-1900-0000-ea42-38efb40b0000 pid=2996->guuid=ca9a2643-1900-0000-ea42-38ef210c0000 pid=3105 clone guuid=e13a3443-1900-0000-ea42-38ef220c0000 pid=3106 /usr/bin/rm guuid=44d49c23-1900-0000-ea42-38efb40b0000 pid=2996->guuid=e13a3443-1900-0000-ea42-38ef220c0000 pid=3106 execve guuid=c42f7743-1900-0000-ea42-38ef240c0000 pid=3108 /usr/bin/busybox net send-data write-file guuid=44d49c23-1900-0000-ea42-38efb40b0000 pid=2996->guuid=c42f7743-1900-0000-ea42-38ef240c0000 pid=3108 execve guuid=296f4447-1900-0000-ea42-38ef300c0000 pid=3120 /usr/bin/chmod guuid=44d49c23-1900-0000-ea42-38efb40b0000 pid=2996->guuid=296f4447-1900-0000-ea42-38ef300c0000 pid=3120 execve guuid=43107c47-1900-0000-ea42-38ef310c0000 pid=3121 /usr/bin/dash guuid=44d49c23-1900-0000-ea42-38efb40b0000 pid=2996->guuid=43107c47-1900-0000-ea42-38ef310c0000 pid=3121 clone guuid=52098a47-1900-0000-ea42-38ef320c0000 pid=3122 /usr/bin/rm guuid=44d49c23-1900-0000-ea42-38efb40b0000 pid=2996->guuid=52098a47-1900-0000-ea42-38ef320c0000 pid=3122 execve guuid=1182c647-1900-0000-ea42-38ef330c0000 pid=3123 /usr/bin/busybox net send-data write-file guuid=44d49c23-1900-0000-ea42-38efb40b0000 pid=2996->guuid=1182c647-1900-0000-ea42-38ef330c0000 pid=3123 execve guuid=edbc5b4b-1900-0000-ea42-38ef390c0000 pid=3129 /usr/bin/chmod guuid=44d49c23-1900-0000-ea42-38efb40b0000 pid=2996->guuid=edbc5b4b-1900-0000-ea42-38ef390c0000 pid=3129 execve guuid=26c0914b-1900-0000-ea42-38ef3a0c0000 pid=3130 /usr/bin/dash guuid=44d49c23-1900-0000-ea42-38efb40b0000 pid=2996->guuid=26c0914b-1900-0000-ea42-38ef3a0c0000 pid=3130 clone guuid=0aa0a04b-1900-0000-ea42-38ef3b0c0000 pid=3131 /usr/bin/rm guuid=44d49c23-1900-0000-ea42-38efb40b0000 pid=2996->guuid=0aa0a04b-1900-0000-ea42-38ef3b0c0000 pid=3131 execve guuid=046dd34b-1900-0000-ea42-38ef3d0c0000 pid=3133 /usr/bin/busybox net send-data write-file guuid=44d49c23-1900-0000-ea42-38efb40b0000 pid=2996->guuid=046dd34b-1900-0000-ea42-38ef3d0c0000 pid=3133 execve guuid=937d714f-1900-0000-ea42-38ef460c0000 pid=3142 /usr/bin/chmod guuid=44d49c23-1900-0000-ea42-38efb40b0000 pid=2996->guuid=937d714f-1900-0000-ea42-38ef460c0000 pid=3142 execve guuid=9891ba4f-1900-0000-ea42-38ef470c0000 pid=3143 /usr/bin/dash guuid=44d49c23-1900-0000-ea42-38efb40b0000 pid=2996->guuid=9891ba4f-1900-0000-ea42-38ef470c0000 pid=3143 clone guuid=d56ed54f-1900-0000-ea42-38ef480c0000 pid=3144 /usr/bin/rm guuid=44d49c23-1900-0000-ea42-38efb40b0000 pid=2996->guuid=d56ed54f-1900-0000-ea42-38ef480c0000 pid=3144 execve guuid=da54a350-1900-0000-ea42-38ef490c0000 pid=3145 /usr/bin/busybox net send-data write-file guuid=44d49c23-1900-0000-ea42-38efb40b0000 pid=2996->guuid=da54a350-1900-0000-ea42-38ef490c0000 pid=3145 execve guuid=91cda554-1900-0000-ea42-38ef560c0000 pid=3158 /usr/bin/chmod guuid=44d49c23-1900-0000-ea42-38efb40b0000 pid=2996->guuid=91cda554-1900-0000-ea42-38ef560c0000 pid=3158 execve guuid=399fda54-1900-0000-ea42-38ef580c0000 pid=3160 /usr/bin/dash guuid=44d49c23-1900-0000-ea42-38efb40b0000 pid=2996->guuid=399fda54-1900-0000-ea42-38ef580c0000 pid=3160 clone guuid=d9120655-1900-0000-ea42-38ef590c0000 pid=3161 /usr/bin/rm guuid=44d49c23-1900-0000-ea42-38efb40b0000 pid=2996->guuid=d9120655-1900-0000-ea42-38ef590c0000 pid=3161 execve guuid=b2455855-1900-0000-ea42-38ef5b0c0000 pid=3163 /usr/bin/wget net send-data write-file guuid=44d49c23-1900-0000-ea42-38efb40b0000 pid=2996->guuid=b2455855-1900-0000-ea42-38ef5b0c0000 pid=3163 execve guuid=ab72625b-1900-0000-ea42-38ef6d0c0000 pid=3181 /usr/bin/chmod guuid=44d49c23-1900-0000-ea42-38efb40b0000 pid=2996->guuid=ab72625b-1900-0000-ea42-38ef6d0c0000 pid=3181 execve guuid=64ccc85b-1900-0000-ea42-38ef6f0c0000 pid=3183 /usr/bin/dash guuid=44d49c23-1900-0000-ea42-38efb40b0000 pid=2996->guuid=64ccc85b-1900-0000-ea42-38ef6f0c0000 pid=3183 clone guuid=41c9e15b-1900-0000-ea42-38ef700c0000 pid=3184 /usr/bin/rm guuid=44d49c23-1900-0000-ea42-38efb40b0000 pid=2996->guuid=41c9e15b-1900-0000-ea42-38ef700c0000 pid=3184 execve b74d60aa-ce52-59bb-a391-58d03c545629 130.12.180.20:36695 guuid=37975624-1900-0000-ea42-38efb90b0000 pid=3001->b74d60aa-ce52-59bb-a391-58d03c545629 send: 86B guuid=67871429-1900-0000-ea42-38efc50b0000 pid=3013->b74d60aa-ce52-59bb-a391-58d03c545629 send: 86B guuid=cf14652d-1900-0000-ea42-38efd50b0000 pid=3029->b74d60aa-ce52-59bb-a391-58d03c545629 send: 86B guuid=f53abd31-1900-0000-ea42-38efe60b0000 pid=3046->b74d60aa-ce52-59bb-a391-58d03c545629 send: 86B guuid=d69e1936-1900-0000-ea42-38eff70b0000 pid=3063->b74d60aa-ce52-59bb-a391-58d03c545629 send: 86B guuid=086e713a-1900-0000-ea42-38ef0a0c0000 pid=3082->b74d60aa-ce52-59bb-a391-58d03c545629 send: 86B guuid=bd93f43e-1900-0000-ea42-38ef170c0000 pid=3095->b74d60aa-ce52-59bb-a391-58d03c545629 send: 86B guuid=c42f7743-1900-0000-ea42-38ef240c0000 pid=3108->b74d60aa-ce52-59bb-a391-58d03c545629 send: 85B guuid=1182c647-1900-0000-ea42-38ef330c0000 pid=3123->b74d60aa-ce52-59bb-a391-58d03c545629 send: 85B guuid=046dd34b-1900-0000-ea42-38ef3d0c0000 pid=3133->b74d60aa-ce52-59bb-a391-58d03c545629 send: 85B guuid=da54a350-1900-0000-ea42-38ef490c0000 pid=3145->b74d60aa-ce52-59bb-a391-58d03c545629 send: 85B guuid=b2455855-1900-0000-ea42-38ef5b0c0000 pid=3163->b74d60aa-ce52-59bb-a391-58d03c545629 send: 140B
Verdict:
Malicious
Threat:
Trojan-Downloader.Shell.Agent
Threat name:
Script-Shell.Worm.Mirai
Status:
Malicious
First seen:
2026-01-01 23:05:39 UTC
File Type:
Text (Shell)
AV detection:
14 of 24 (58.33%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Modifies registry class
Suspicious use of SetWindowsHookEx
Enumerates physical storage devices
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:MAL_Linux_IoT_MultiArch_BotnetLoader_Generic
Author:Anish Bogati
Description:Technique-based detection of IoT/Linux botnet loader shell scripts downloading binaries from numeric IPs, chmodding, and executing multi-architecture payloads
Reference:MalwareBazaar sample lilin.sh

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh 3046a730c53d084e825493abb25e7d7ec1e65c5d13f941f62f8e5fef71f8eda7

(this sample)

  
Delivery method
Distributed via web download

Comments