MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 31d169de654f9bf8ddf5bc22428875424fdf4f3bc8182c9005beef5152a7d2be. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: 31d169de654f9bf8ddf5bc22428875424fdf4f3bc8182c9005beef5152a7d2be
SHA3-384 hash: 7835ba5955471b4ec500f8361286e49e402a1a4dd737793356942517b64184f8c43e18b0661f5f600af5a66f6c7197c8
SHA1 hash: 463f48be005c05e73b8306be9c10720e190b5299
MD5 hash: af331fbf38a20d3bba5ae963e8b59746
humanhash: california-football-mexico-nineteen
File name:k.sh
Download: download sample
Signature Mirai
File size:948 bytes
First seen:2025-11-15 20:51:29 UTC
Last seen:Never
File type: sh
MIME type:text/plain
ssdeep 24:sEqoWBGhBh9Mk8QoWG3p2VGXO/I/V7NGIkoZX9lHp:sEqoGGhL8QoWGIVG+wV7NGIko19tp
TLSH T10011BD9DDDC2E992C425590C70C7C14CB053C3DE2AD38E59EC1D2A6938CC849F435B74
Magika shell
Reporter abuse_ch
Tags:mirai sh
URLMalware sample (SHA256 hash)SignatureTags
http://158.94.209.216/arm14883298489d57b2242533f561769e8f21737126e8560c4b9955dc701478c23e Mirai32-bit elf mirai Mozi
http://158.94.209.216/arm582ee72be70e8dce122910449268514083943892258ea9b9d21068e03286d03f8 Miraielf mirai
http://158.94.209.216/arm75a469ba94c55f39fdf0656a0a1b98c988d699569397587d8e1141a0d928b9eea Miraielf mirai
http://158.94.209.216/mips77637c28bd5ccda2ad3c90c2d34e879fa7e10f1abe04520e5bda11cd7ed69c8e Gafgyt32-bit elf gafgyt Mozi
http://158.94.209.216/mpslafe59ccdfac00527b2983101bc1e5d91361609b4753962e0cb2cc890b8a35d2f Gafgytelf gafgyt

Intelligence


File Origin
# of uploads :
1
# of downloads :
30
Origin country :
DE DE
Vendor Threat Intelligence
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
busybox evasive
Verdict:
Malicious
File Type:
unix shell
First seen:
2025-11-15T18:36:00Z UTC
Last seen:
2025-11-16T12:02:00Z UTC
Hits:
~10
Status:
terminated
Behavior Graph:
%3 guuid=8597d1d5-1a00-0000-64d7-f3f9d0090000 pid=2512 /usr/bin/sudo guuid=66ec48d8-1a00-0000-64d7-f3f9d7090000 pid=2519 /tmp/sample.bin guuid=8597d1d5-1a00-0000-64d7-f3f9d0090000 pid=2512->guuid=66ec48d8-1a00-0000-64d7-f3f9d7090000 pid=2519 execve guuid=5a614cdf-1a00-0000-64d7-f3f9e9090000 pid=2537 /usr/bin/rm guuid=66ec48d8-1a00-0000-64d7-f3f9d7090000 pid=2519->guuid=5a614cdf-1a00-0000-64d7-f3f9e9090000 pid=2537 execve guuid=ce9399df-1a00-0000-64d7-f3f9ea090000 pid=2538 /usr/bin/wget net send-data write-file guuid=66ec48d8-1a00-0000-64d7-f3f9d7090000 pid=2519->guuid=ce9399df-1a00-0000-64d7-f3f9ea090000 pid=2538 execve guuid=4aacff09-1b00-0000-64d7-f3f9020a0000 pid=2562 /usr/bin/chmod guuid=66ec48d8-1a00-0000-64d7-f3f9d7090000 pid=2519->guuid=4aacff09-1b00-0000-64d7-f3f9020a0000 pid=2562 execve guuid=ecc76d0a-1b00-0000-64d7-f3f9050a0000 pid=2565 /usr/bin/dash guuid=66ec48d8-1a00-0000-64d7-f3f9d7090000 pid=2519->guuid=ecc76d0a-1b00-0000-64d7-f3f9050a0000 pid=2565 clone guuid=a6a1240b-1b00-0000-64d7-f3f9090a0000 pid=2569 /usr/bin/rm guuid=66ec48d8-1a00-0000-64d7-f3f9d7090000 pid=2519->guuid=a6a1240b-1b00-0000-64d7-f3f9090a0000 pid=2569 execve guuid=ee75a30b-1b00-0000-64d7-f3f90b0a0000 pid=2571 /usr/bin/wget net send-data write-file guuid=66ec48d8-1a00-0000-64d7-f3f9d7090000 pid=2519->guuid=ee75a30b-1b00-0000-64d7-f3f90b0a0000 pid=2571 execve guuid=9dab1e19-1b00-0000-64d7-f3f92f0a0000 pid=2607 /usr/bin/chmod guuid=66ec48d8-1a00-0000-64d7-f3f9d7090000 pid=2519->guuid=9dab1e19-1b00-0000-64d7-f3f92f0a0000 pid=2607 execve guuid=e7697b19-1b00-0000-64d7-f3f9310a0000 pid=2609 /usr/bin/dash guuid=66ec48d8-1a00-0000-64d7-f3f9d7090000 pid=2519->guuid=e7697b19-1b00-0000-64d7-f3f9310a0000 pid=2609 clone guuid=da3ffb19-1b00-0000-64d7-f3f9340a0000 pid=2612 /usr/bin/rm guuid=66ec48d8-1a00-0000-64d7-f3f9d7090000 pid=2519->guuid=da3ffb19-1b00-0000-64d7-f3f9340a0000 pid=2612 execve guuid=cc3b3c1a-1b00-0000-64d7-f3f9360a0000 pid=2614 /usr/bin/wget net send-data write-file guuid=66ec48d8-1a00-0000-64d7-f3f9d7090000 pid=2519->guuid=cc3b3c1a-1b00-0000-64d7-f3f9360a0000 pid=2614 execve guuid=dc415729-1b00-0000-64d7-f3f95a0a0000 pid=2650 /usr/bin/chmod guuid=66ec48d8-1a00-0000-64d7-f3f9d7090000 pid=2519->guuid=dc415729-1b00-0000-64d7-f3f95a0a0000 pid=2650 execve guuid=1adfe229-1b00-0000-64d7-f3f95c0a0000 pid=2652 /usr/bin/dash guuid=66ec48d8-1a00-0000-64d7-f3f9d7090000 pid=2519->guuid=1adfe229-1b00-0000-64d7-f3f95c0a0000 pid=2652 clone guuid=90949a2a-1b00-0000-64d7-f3f9600a0000 pid=2656 /usr/bin/rm guuid=66ec48d8-1a00-0000-64d7-f3f9d7090000 pid=2519->guuid=90949a2a-1b00-0000-64d7-f3f9600a0000 pid=2656 execve guuid=8314ef2a-1b00-0000-64d7-f3f9610a0000 pid=2657 /usr/bin/wget net send-data write-file guuid=66ec48d8-1a00-0000-64d7-f3f9d7090000 pid=2519->guuid=8314ef2a-1b00-0000-64d7-f3f9610a0000 pid=2657 execve guuid=fc81413d-1b00-0000-64d7-f3f98c0a0000 pid=2700 /usr/bin/chmod guuid=66ec48d8-1a00-0000-64d7-f3f9d7090000 pid=2519->guuid=fc81413d-1b00-0000-64d7-f3f98c0a0000 pid=2700 execve guuid=da580c3e-1b00-0000-64d7-f3f9900a0000 pid=2704 /usr/bin/dash guuid=66ec48d8-1a00-0000-64d7-f3f9d7090000 pid=2519->guuid=da580c3e-1b00-0000-64d7-f3f9900a0000 pid=2704 clone guuid=c962a73e-1b00-0000-64d7-f3f9930a0000 pid=2707 /usr/bin/rm guuid=66ec48d8-1a00-0000-64d7-f3f9d7090000 pid=2519->guuid=c962a73e-1b00-0000-64d7-f3f9930a0000 pid=2707 execve guuid=55c4ed3e-1b00-0000-64d7-f3f9950a0000 pid=2709 /usr/bin/wget net send-data write-file guuid=66ec48d8-1a00-0000-64d7-f3f9d7090000 pid=2519->guuid=55c4ed3e-1b00-0000-64d7-f3f9950a0000 pid=2709 execve guuid=7f0ac74e-1b00-0000-64d7-f3f9bd0a0000 pid=2749 /usr/bin/chmod guuid=66ec48d8-1a00-0000-64d7-f3f9d7090000 pid=2519->guuid=7f0ac74e-1b00-0000-64d7-f3f9bd0a0000 pid=2749 execve guuid=d57f764f-1b00-0000-64d7-f3f9be0a0000 pid=2750 /usr/bin/dash guuid=66ec48d8-1a00-0000-64d7-f3f9d7090000 pid=2519->guuid=d57f764f-1b00-0000-64d7-f3f9be0a0000 pid=2750 clone 09d65e53-632c-52c6-b821-8fe0f69e747e 158.94.209.216:80 guuid=ce9399df-1a00-0000-64d7-f3f9ea090000 pid=2538->09d65e53-632c-52c6-b821-8fe0f69e747e send: 132B guuid=ee75a30b-1b00-0000-64d7-f3f90b0a0000 pid=2571->09d65e53-632c-52c6-b821-8fe0f69e747e send: 133B guuid=cc3b3c1a-1b00-0000-64d7-f3f9360a0000 pid=2614->09d65e53-632c-52c6-b821-8fe0f69e747e send: 133B guuid=8314ef2a-1b00-0000-64d7-f3f9610a0000 pid=2657->09d65e53-632c-52c6-b821-8fe0f69e747e send: 133B guuid=55c4ed3e-1b00-0000-64d7-f3f9950a0000 pid=2709->09d65e53-632c-52c6-b821-8fe0f69e747e send: 133B
Threat name:
Script.Trojan.Multiverze
Status:
Malicious
First seen:
2025-11-15 20:45:13 UTC
File Type:
Text (Shell)
AV detection:
10 of 24 (41.67%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Modifies registry class
Suspicious use of SetWindowsHookEx
Enumerates physical storage devices
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh 31d169de654f9bf8ddf5bc22428875424fdf4f3bc8182c9005beef5152a7d2be

(this sample)

  
Delivery method
Distributed via web download

Comments