MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 321d537e5d48cef97ce131a77fb06e76404862270393c85906052ddfef0d323f. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 9


Intelligence 9 IOCs YARA 2 File information Comments

SHA256 hash: 321d537e5d48cef97ce131a77fb06e76404862270393c85906052ddfef0d323f
SHA3-384 hash: 6eaf1255c74d7c0292088a1e4887e5574a03b73dcaaf1646677036590feea9a7e36d36953007c096281ed772d0819a0f
SHA1 hash: 847b34bf976efcd40641de7c839f5e3a77f7e5fc
MD5 hash: e00bb356a71835567c5e988f4c235829
humanhash: cardinal-tennis-four-california
File name:Pandora.sh
Download: download sample
Signature Mirai
File size:1'257 bytes
First seen:2026-01-24 03:45:43 UTC
Last seen:Never
File type: sh
MIME type:text/x-shellscript
ssdeep 24:vnX8XEhnXhHXhjVinXh0XhAVnXhDiXhCdhnXWTiXWkA7nXQXh:vnX8XEhnXhHXhjVinXh0XhAVnXhuXhCF
TLSH T1D92195D632600BF6AFE1DA21B2A44044E9D561F269D06FC9D8DC34F7A08DDC835C097B
TrID 70.0% (.SH) Linux/UNIX shell script (7000/1)
30.0% (.) Unix-like shebang (var.3) (gen) (3000/1)
Magika shell
Reporter abuse_ch
Tags:sh
URLMalware sample (SHA256 hash)SignatureTags
http://87.106.143.220/Pandoras_Box/pandora.x86_64f6d5705c99bf3a6aa78f41478335a86f5464171aaeda34dfb3b3098de2ac1ab3 Miraielf geofenced mirai ua-wget USA x86
http://87.106.143.220/Pandoras_Box/pandora.arme427f187418425a5fe443633866b41df0d4db060e157ec3bd8313d71d18da47b Miraiarm elf geofenced mirai ua-wget USA
http://87.106.143.220/Pandoras_Box/pandora.arm7c41cc60efa39004f1d069ed9af1c3560b69646dc2fc2e7eb18e210a0ae0a8af7 Miraiarm elf geofenced mirai ua-wget USA
http://87.106.143.220/Pandoras_Box/pandora.aarch64n/an/aarm elf geofenced ua-wget USA
http://87.106.143.220/Pandoras_Box/pandora.mpsla6dd3ee67ea2ed50379efd27bfa4e1b23fa69efa062b12eb824650157e89e07d Miraielf geofenced mips mirai ua-wget USA
http://87.106.143.220/Pandoras_Box/pandora.ppca4186f78e926adc385476b4b19b2f989dbbddea6d64a706a05d8d23b89f21438 Miraielf geofenced mirai PowerPC ua-wget USA

Intelligence


File Origin
# of uploads :
1
# of downloads :
62
Origin country :
DE DE
Vendor Threat Intelligence
No detections
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
medusa mirai
Verdict:
Malicious
File Type:
unix shell
First seen:
2026-01-24T00:51:00Z UTC
Last seen:
2026-01-25T12:54:00Z UTC
Hits:
~100
Detections:
HEUR:Trojan-Downloader.Shell.Agent.p HEUR:Trojan-Downloader.Shell.Agent.a
Verdict:
Malicious
Threat:
Trojan-Downloader.Shell.Agent
Threat name:
Linux.Downloader.Medusa
Status:
Malicious
First seen:
2026-01-24 03:46:27 UTC
File Type:
Text (Shell)
AV detection:
17 of 24 (70.83%)
Threat level:
  3/5
Result
Malware family:
n/a
Score:
  9/10
Tags:
antivm defense_evasion discovery linux
Behaviour
Reads runtime system information
Writes file to tmp directory
Checks CPU configuration
Reads system network configuration
Enumerates active TCP sockets
Enumerates running processes
File and Directory Permissions Modification
Executes dropped EXE
Modifies Watchdog functionality
Contacts a large (120197) amount of remote hosts
Creates a large amount of network flows
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Linux_Shellscript_Downloader
Author:albertzsigovits
Description:Generic Approach to Shellscript downloaders
Rule name:MAL_Linux_IoT_MultiArch_BotnetLoader_Generic
Author:Anish Bogati
Description:Technique-based detection of IoT/Linux botnet loader shell scripts downloading binaries from numeric IPs, chmodding, and executing multi-architecture payloads
Reference:MalwareBazaar sample lilin.sh

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh 321d537e5d48cef97ce131a77fb06e76404862270393c85906052ddfef0d323f

(this sample)

Comments