MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 32417bbb1a4a5f0ed3494c2f64dd1361e43e9b0de199346c4d25957c054616de. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 7


Intelligence 7 IOCs YARA 1 File information Comments

SHA256 hash: 32417bbb1a4a5f0ed3494c2f64dd1361e43e9b0de199346c4d25957c054616de
SHA3-384 hash: 9a6a830f0b99933bae84f675c2526db0ed0e85a96f1e64e927aea1a9290a9115d39a2fbf738f9434d5839dca88ebffc3
SHA1 hash: 8f3c9fbeef806cea0faa80a4396238a2ce64e3d1
MD5 hash: 373b2c46cbb122b3c7a1b1ceb9323b5f
humanhash: potato-delta-juliet-artist
File name:1.sh
Download: download sample
Signature Mirai
File size:5'515 bytes
First seen:2025-06-05 06:35:38 UTC
Last seen:2025-06-05 16:24:45 UTC
File type: sh
MIME type:text/x-shellscript
ssdeep 96:iHd56Z+UYvvoZK+h/CHd56Z+UYvvoZK+h/V:1
TLSH T1EFB1A3C527224B306FA75D33B3BB174E3882A8A29CD55FA459EC3CB56A8CD487059B43
Magika shell
Reporter abuse_ch
Tags:mirai sh
URLMalware sample (SHA256 hash)SignatureTags
http://103.77.241.50/dwrioej/neon.x86n/an/an/a
http://103.77.241.50/dwrioej/neon.mips89465b50c1238c85c862cabf059fdb958d3cf5fe8570fe658434f8a1d82e53b1 Miraielf mirai opendir
http://103.77.241.50/dwrioej/neon.arc060e61d62f62d04da4b672a9f8d4d91f0cd74f60f2d9ac6bf8889c41f36e9836 Miraielf mirai opendir
http://103.77.241.50/dwrioej/neon.i468n/an/an/a
http://103.77.241.50/dwrioej/neon.i686n/an/aelf mirai opendir
http://103.77.241.50/dwrioej/neon.x86_644232352631d5ec10ca6b250a4b7b9214fbc574fb016c58ca213cb88b915cd957 Miraielf mirai opendir
http://103.77.241.50/dwrioej/neon.mpsln/an/an/a
http://103.77.241.50/dwrioej/neon.armn/an/an/a
http://103.77.241.50/dwrioej/neon.arm5n/an/an/a
http://103.77.241.50/dwrioej/neon.arm6n/an/an/a
http://103.77.241.50/dwrioej/neon.arm7n/an/an/a
http://103.77.241.50/dwrioej/neon.ppcn/an/an/a
http://103.77.241.50/dwrioej/neon.spcn/an/an/a
http://103.77.241.50/dwrioej/neon.m68k232f4b0b3c220b6d0cfe8ab544f2d1c609fad5b532a3a818a9738897eed09ef9 Miraielf mirai opendir
http://103.77.241.50/dwrioej/neon.sh4b79a1b809cc5bf3dbf94f0dbbfa6d64c07ae3d5e88bb1cfda31752680d830e05 Miraielf mirai opendir

Intelligence


File Origin
# of uploads :
2
# of downloads :
80
Origin country :
DE DE
Vendor Threat Intelligence
Verdict:
Malicious
Score:
99.9%
Tags:
downloader ransomware agent
Threat name:
Linux.Downloader.ShWg
Status:
Malicious
First seen:
2025-06-05 06:36:21 UTC
File Type:
Text (Shell)
AV detection:
15 of 24 (62.50%)
Threat level:
  3/5
Result
Malware family:
Score:
  10/10
Tags:
family:mirai antivm botnet defense_evasion discovery linux upx
Behaviour
Reads runtime system information
System Network Configuration Discovery
Writes file to tmp directory
Checks CPU configuration
Reads system network configuration
UPX packed file
Enumerates active TCP sockets
Enumerates running processes
Writes file to system bin folder
File and Directory Permissions Modification
Executes dropped EXE
Modifies Watchdog functionality
Contacts a large (821127) amount of remote hosts
Creates a large amount of network flows
Mirai
Mirai family
Malware Config
C2 Extraction:
traxanhc2.duckdns.org
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Linux_Shellscript_Downloader
Author:albertzsigovits
Description:Generic Approach to Shellscript downloaders

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh 32417bbb1a4a5f0ed3494c2f64dd1361e43e9b0de199346c4d25957c054616de

(this sample)

  
Delivery method
Distributed via web download

Comments