MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 30c845460fab23d792801dcded330781e673f9d38d0000b3ecfc349542bb29f7. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: 30c845460fab23d792801dcded330781e673f9d38d0000b3ecfc349542bb29f7
SHA3-384 hash: 3b0e4e9e39ab4957bb0b83a3e3165123a8a927637b0b9ec036406e7e9f1b25cb2c3c446b0f14e4422fd2c9bbfc071bd4
SHA1 hash: f15249e1dd4631e5b51b71403cafd793169a9071
MD5 hash: abdf0684c65745ce2c41c735c91062aa
humanhash: papa-nevada-maine-music
File name:wget.sh
Download: download sample
Signature Mirai
File size:835 bytes
First seen:2025-12-24 13:09:49 UTC
Last seen:2025-12-25 10:08:25 UTC
File type: sh
MIME type:text/x-shellscript
ssdeep 12:KSs6wZjcLTjcL9NyHe0fjcLcswjceSYeJB/jcHpLjcLbynjck:KSKZjczcR67cwsUcSeLcHpHc/yjck
TLSH T1BF01E9CD01906769858CDA0BF7934A3C14444ECE46C91BCE3DCC4427E684AE9F518E6C
TrID 70.0% (.SH) Linux/UNIX shell script (7000/1)
30.0% (.) Unix-like shebang (var.3) (gen) (3000/1)
Magika shell
Reporter abuse_ch
Tags:mirai sh
URLMalware sample (SHA256 hash)SignatureTags
http://103.149.29.38/arm45168bc663329c3b1d883b83a59fe84f08b6e01895c37144ddfa9156bea3eaee Mirai32-bit elf mirai Mozi
http://103.149.29.38/arm5c081b0cb0bf6317b1c5a57c3c6c821afc9656185960865bece92b13f5da8817a Miraielf mirai ua-wget
http://103.149.29.38/arm725d009b54cc805f0e3f69e011da81239bfb6422877c1574d62e0fbc988eab49a Miraielf mirai ua-wget
http://103.149.29.38/mipsa04ede576aa16c227ad500289a8c66fdd19fdbff2697ece9a24705418b42b9e0 Mirai32-bit elf mirai Mozi
http://103.149.29.38/mpsl25f528c64b08f744661e0a347d6f8152fa9b76e2f62f42c2351539186cc1dcde Gafgytelf gafgyt ua-wget
http://103.149.29.38/arcb6ee760b9fbfe272a0013850886a8e4e0b4fd824fb44b2a038ce187e8126dece Miraielf mirai ua-wget
http://103.149.29.38/aarch6469008b5e7815c51d3b6d26bb29ebdd82057ee1c853b0368111bd47a3f145ba5f Miraielf mirai ua-wget

Intelligence


File Origin
# of uploads :
2
# of downloads :
36
Origin country :
DE DE
Vendor Threat Intelligence
No detections
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
anti-vm busybox expand lolbin mirai
Verdict:
Malicious
File Type:
unix shell
First seen:
2025-12-24T10:19:00Z UTC
Last seen:
2025-12-24T18:20:00Z UTC
Hits:
~10
Detections:
HEUR:Trojan-Downloader.Shell.Agent.p
Status:
terminated
Behavior Graph:
%3 guuid=13ee03fa-1800-0000-c454-cf31fe0a0000 pid=2814 /usr/bin/sudo guuid=f2269dfc-1800-0000-c454-cf31020b0000 pid=2818 /tmp/sample.bin guuid=13ee03fa-1800-0000-c454-cf31fe0a0000 pid=2814->guuid=f2269dfc-1800-0000-c454-cf31020b0000 pid=2818 execve guuid=19e5e3fc-1800-0000-c454-cf31030b0000 pid=2819 /usr/bin/rm guuid=f2269dfc-1800-0000-c454-cf31020b0000 pid=2818->guuid=19e5e3fc-1800-0000-c454-cf31030b0000 pid=2819 execve guuid=91c548fd-1800-0000-c454-cf31050b0000 pid=2821 /usr/bin/rm guuid=f2269dfc-1800-0000-c454-cf31020b0000 pid=2818->guuid=91c548fd-1800-0000-c454-cf31050b0000 pid=2821 execve guuid=de709cfd-1800-0000-c454-cf31070b0000 pid=2823 /usr/bin/rm guuid=f2269dfc-1800-0000-c454-cf31020b0000 pid=2818->guuid=de709cfd-1800-0000-c454-cf31070b0000 pid=2823 execve guuid=550bf5fd-1800-0000-c454-cf31090b0000 pid=2825 /usr/bin/rm guuid=f2269dfc-1800-0000-c454-cf31020b0000 pid=2818->guuid=550bf5fd-1800-0000-c454-cf31090b0000 pid=2825 execve guuid=914239fe-1800-0000-c454-cf310b0b0000 pid=2827 /usr/bin/rm guuid=f2269dfc-1800-0000-c454-cf31020b0000 pid=2818->guuid=914239fe-1800-0000-c454-cf310b0b0000 pid=2827 execve guuid=635279fe-1800-0000-c454-cf310d0b0000 pid=2829 /usr/bin/rm guuid=f2269dfc-1800-0000-c454-cf31020b0000 pid=2818->guuid=635279fe-1800-0000-c454-cf310d0b0000 pid=2829 execve guuid=9266bbfe-1800-0000-c454-cf310f0b0000 pid=2831 /usr/bin/rm guuid=f2269dfc-1800-0000-c454-cf31020b0000 pid=2818->guuid=9266bbfe-1800-0000-c454-cf310f0b0000 pid=2831 execve guuid=eb4713ff-1800-0000-c454-cf31100b0000 pid=2832 /usr/bin/cp guuid=f2269dfc-1800-0000-c454-cf31020b0000 pid=2818->guuid=eb4713ff-1800-0000-c454-cf31100b0000 pid=2832 execve guuid=50e65306-1900-0000-c454-cf31190b0000 pid=2841 /usr/bin/busybox net send-data write-file guuid=f2269dfc-1800-0000-c454-cf31020b0000 pid=2818->guuid=50e65306-1900-0000-c454-cf31190b0000 pid=2841 execve guuid=0f69e445-1900-0000-c454-cf319e0b0000 pid=2974 /usr/bin/chmod guuid=f2269dfc-1800-0000-c454-cf31020b0000 pid=2818->guuid=0f69e445-1900-0000-c454-cf319e0b0000 pid=2974 execve guuid=0e662646-1900-0000-c454-cf319f0b0000 pid=2975 /usr/bin/dash guuid=f2269dfc-1800-0000-c454-cf31020b0000 pid=2818->guuid=0e662646-1900-0000-c454-cf319f0b0000 pid=2975 clone guuid=c5f64f47-1900-0000-c454-cf31a20b0000 pid=2978 /usr/bin/busybox net send-data write-file guuid=f2269dfc-1800-0000-c454-cf31020b0000 pid=2818->guuid=c5f64f47-1900-0000-c454-cf31a20b0000 pid=2978 execve guuid=5d128785-1900-0000-c454-cf313b0c0000 pid=3131 /usr/bin/chmod guuid=f2269dfc-1800-0000-c454-cf31020b0000 pid=2818->guuid=5d128785-1900-0000-c454-cf313b0c0000 pid=3131 execve guuid=99b0c485-1900-0000-c454-cf313d0c0000 pid=3133 /usr/bin/dash guuid=f2269dfc-1800-0000-c454-cf31020b0000 pid=2818->guuid=99b0c485-1900-0000-c454-cf313d0c0000 pid=3133 clone guuid=7d188786-1900-0000-c454-cf31420c0000 pid=3138 /usr/bin/busybox net send-data write-file guuid=f2269dfc-1800-0000-c454-cf31020b0000 pid=2818->guuid=7d188786-1900-0000-c454-cf31420c0000 pid=3138 execve guuid=836869c5-1900-0000-c454-cf319b0c0000 pid=3227 /usr/bin/chmod guuid=f2269dfc-1800-0000-c454-cf31020b0000 pid=2818->guuid=836869c5-1900-0000-c454-cf319b0c0000 pid=3227 execve guuid=969008c6-1900-0000-c454-cf319c0c0000 pid=3228 /usr/bin/dash guuid=f2269dfc-1800-0000-c454-cf31020b0000 pid=2818->guuid=969008c6-1900-0000-c454-cf319c0c0000 pid=3228 clone guuid=42a120c8-1900-0000-c454-cf319e0c0000 pid=3230 /usr/bin/busybox net send-data write-file guuid=f2269dfc-1800-0000-c454-cf31020b0000 pid=2818->guuid=42a120c8-1900-0000-c454-cf319e0c0000 pid=3230 execve guuid=7da9e809-1a00-0000-c454-cf31100d0000 pid=3344 /usr/bin/chmod guuid=f2269dfc-1800-0000-c454-cf31020b0000 pid=2818->guuid=7da9e809-1a00-0000-c454-cf31100d0000 pid=3344 execve guuid=3bd9440a-1a00-0000-c454-cf31110d0000 pid=3345 /usr/bin/dash guuid=f2269dfc-1800-0000-c454-cf31020b0000 pid=2818->guuid=3bd9440a-1a00-0000-c454-cf31110d0000 pid=3345 clone guuid=6269180b-1a00-0000-c454-cf31130d0000 pid=3347 /usr/bin/busybox net send-data write-file guuid=f2269dfc-1800-0000-c454-cf31020b0000 pid=2818->guuid=6269180b-1a00-0000-c454-cf31130d0000 pid=3347 execve guuid=41b50756-1a00-0000-c454-cf31b70d0000 pid=3511 /usr/bin/chmod guuid=f2269dfc-1800-0000-c454-cf31020b0000 pid=2818->guuid=41b50756-1a00-0000-c454-cf31b70d0000 pid=3511 execve guuid=c2c34356-1a00-0000-c454-cf31b80d0000 pid=3512 /usr/bin/dash guuid=f2269dfc-1800-0000-c454-cf31020b0000 pid=2818->guuid=c2c34356-1a00-0000-c454-cf31b80d0000 pid=3512 clone guuid=d35c7657-1a00-0000-c454-cf31ba0d0000 pid=3514 /usr/bin/busybox net send-data write-file guuid=f2269dfc-1800-0000-c454-cf31020b0000 pid=2818->guuid=d35c7657-1a00-0000-c454-cf31ba0d0000 pid=3514 execve guuid=6b64c497-1a00-0000-c454-cf313b0e0000 pid=3643 /usr/bin/chmod guuid=f2269dfc-1800-0000-c454-cf31020b0000 pid=2818->guuid=6b64c497-1a00-0000-c454-cf313b0e0000 pid=3643 execve guuid=b74f3d98-1a00-0000-c454-cf313f0e0000 pid=3647 /usr/bin/dash guuid=f2269dfc-1800-0000-c454-cf31020b0000 pid=2818->guuid=b74f3d98-1a00-0000-c454-cf313f0e0000 pid=3647 clone guuid=22d5be99-1a00-0000-c454-cf31470e0000 pid=3655 /usr/bin/busybox net send-data write-file guuid=f2269dfc-1800-0000-c454-cf31020b0000 pid=2818->guuid=22d5be99-1a00-0000-c454-cf31470e0000 pid=3655 execve guuid=cfe3a8da-1a00-0000-c454-cf31050f0000 pid=3845 /usr/bin/chmod guuid=f2269dfc-1800-0000-c454-cf31020b0000 pid=2818->guuid=cfe3a8da-1a00-0000-c454-cf31050f0000 pid=3845 execve guuid=6067f0da-1a00-0000-c454-cf31070f0000 pid=3847 /usr/bin/dash guuid=f2269dfc-1800-0000-c454-cf31020b0000 pid=2818->guuid=6067f0da-1a00-0000-c454-cf31070f0000 pid=3847 clone a4f9e411-b1bf-5713-9439-60d2eae80ea8 103.149.29.38:80 guuid=50e65306-1900-0000-c454-cf31190b0000 pid=2841->a4f9e411-b1bf-5713-9439-60d2eae80ea8 send: 79B guuid=c5f64f47-1900-0000-c454-cf31a20b0000 pid=2978->a4f9e411-b1bf-5713-9439-60d2eae80ea8 send: 80B guuid=7d188786-1900-0000-c454-cf31420c0000 pid=3138->a4f9e411-b1bf-5713-9439-60d2eae80ea8 send: 80B guuid=42a120c8-1900-0000-c454-cf319e0c0000 pid=3230->a4f9e411-b1bf-5713-9439-60d2eae80ea8 send: 80B guuid=6269180b-1a00-0000-c454-cf31130d0000 pid=3347->a4f9e411-b1bf-5713-9439-60d2eae80ea8 send: 80B guuid=d35c7657-1a00-0000-c454-cf31ba0d0000 pid=3514->a4f9e411-b1bf-5713-9439-60d2eae80ea8 send: 79B guuid=22d5be99-1a00-0000-c454-cf31470e0000 pid=3655->a4f9e411-b1bf-5713-9439-60d2eae80ea8 send: 83B
Verdict:
Malicious
Threat:
Trojan-Downloader.Shell.Agent
Threat name:
Win32.Trojan.Vigorf
Status:
Malicious
First seen:
2025-12-24 13:10:20 UTC
File Type:
Text (Shell)
AV detection:
10 of 24 (41.67%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  9/10
Tags:
antivm credential_access defense_evasion discovery linux
Behaviour
Reads runtime system information
System Network Configuration Discovery
Writes file to tmp directory
Changes its process name
Checks CPU configuration
Reads system network configuration
Reads process memory
Enumerates active TCP sockets
Enumerates running processes
File and Directory Permissions Modification
Executes dropped EXE
Renames itself
Unexpected DNS network traffic destination
Contacts a large (16281) amount of remote hosts
Creates a large amount of network flows
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh 30c845460fab23d792801dcded330781e673f9d38d0000b3ecfc349542bb29f7

(this sample)

  
Delivery method
Distributed via web download

Comments