MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 331027ed453f9de1d2640644a421b727408dddc443db65076e7d91fedc51e09c. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: 331027ed453f9de1d2640644a421b727408dddc443db65076e7d91fedc51e09c
SHA3-384 hash: 70d9ce6f73b2faf024aa75c7cd4fbb95c1236274b1437017149290e181b706786b9b4b934871272dbf8dacbb045261c5
SHA1 hash: 7da7b61cdd5841c5eaa7f6d0eddab8058454e1a7
MD5 hash: 0030845ccbe63e932d0910724e7452a2
humanhash: violet-triple-cup-mississippi
File name:tplink.sh
Download: download sample
Signature Mirai
File size:1'356 bytes
First seen:2025-08-23 14:42:56 UTC
Last seen:Never
File type: sh
MIME type:text/x-shellscript
ssdeep 24:boWBGhBh9Mk8QoMYuYuWHuBuo/mO87QUt2Kd2MIKpatkk0:boGGhL8QoMYuYuWHuBuo/mO87QUt2g/Z
TLSH T17021E9ED83F1E12D9C5A4F40B2914726F80E5AE430626DE4F68A28E6A45DD217075F26
Magika shell
Reporter abuse_ch
Tags:sh
URLMalware sample (SHA256 hash)SignatureTags
http://103.176.20.59/skid.mips7cd5fb5b6d94ac2acf16f8904f6f307f47710df1d51129d55e70590a52dcf823 Miraielf gafgyt mirai ua-wget
http://103.176.20.59/skid.mpsle4acbf0a1448e928ea7714cf90692001c454b37d78b13a955f475568b36bbaec Miraielf mirai ua-wget
http://103.176.20.59/skid.arm8a235a9336092da5a5fd75dc7c04bf109a796cab8cbe52666f972c2c5f3ff285 Miraielf mirai ua-wget
http://103.176.20.59/skid.arm516877e8cab68f6d6a557b0bee1e41a6d938997cb31a62cfe017ed21867b41801 Miraielf mirai ua-wget
http://103.176.20.59/skid.arm70fd1878b69312fbf748d3be8ba65b3431083985fcfe65a3b32a74a8ef69cdf89 Miraielf mirai ua-wget
http://103.176.20.59/x8681a6645f942191bc2793f956acfc8fa2b80501171f8fc8bb0518ddddb050f649 Miraicensys elf mirai ua-wget

Intelligence


File Origin
# of uploads :
1
# of downloads :
30
Origin country :
DE DE
Vendor Threat Intelligence
Verdict:
Malicious
File Type:
unix shell
First seen:
2025-08-23T09:55:00Z UTC
Last seen:
2025-08-23T09:55:00Z UTC
Hits:
~10
Status:
terminated
Behavior Graph:
%3 guuid=1030f62a-1900-0000-bde0-5d319a130000 pid=5018 /usr/bin/sudo guuid=5484e62c-1900-0000-bde0-5d31a1130000 pid=5025 /tmp/sample.bin guuid=1030f62a-1900-0000-bde0-5d319a130000 pid=5018->guuid=5484e62c-1900-0000-bde0-5d31a1130000 pid=5025 execve guuid=40426632-1900-0000-bde0-5d31ba130000 pid=5050 /usr/bin/rm guuid=5484e62c-1900-0000-bde0-5d31a1130000 pid=5025->guuid=40426632-1900-0000-bde0-5d31ba130000 pid=5050 execve guuid=5f125733-1900-0000-bde0-5d31be130000 pid=5054 /usr/bin/wget net send-data write-file guuid=5484e62c-1900-0000-bde0-5d31a1130000 pid=5025->guuid=5f125733-1900-0000-bde0-5d31be130000 pid=5054 execve guuid=5c544fb4-1900-0000-bde0-5d3161140000 pid=5217 /usr/bin/chmod guuid=5484e62c-1900-0000-bde0-5d31a1130000 pid=5025->guuid=5c544fb4-1900-0000-bde0-5d3161140000 pid=5217 execve guuid=89e296b4-1900-0000-bde0-5d3162140000 pid=5218 /usr/bin/dash guuid=5484e62c-1900-0000-bde0-5d31a1130000 pid=5025->guuid=89e296b4-1900-0000-bde0-5d3162140000 pid=5218 clone guuid=462565b5-1900-0000-bde0-5d3164140000 pid=5220 /usr/bin/wget net send-data write-file guuid=5484e62c-1900-0000-bde0-5d31a1130000 pid=5025->guuid=462565b5-1900-0000-bde0-5d3164140000 pid=5220 execve guuid=a2bdf634-1a00-0000-bde0-5d3169140000 pid=5225 /usr/bin/chmod guuid=5484e62c-1900-0000-bde0-5d31a1130000 pid=5025->guuid=a2bdf634-1a00-0000-bde0-5d3169140000 pid=5225 execve guuid=01624335-1a00-0000-bde0-5d316b140000 pid=5227 /usr/bin/dash guuid=5484e62c-1900-0000-bde0-5d31a1130000 pid=5025->guuid=01624335-1a00-0000-bde0-5d316b140000 pid=5227 clone guuid=d0b1e935-1a00-0000-bde0-5d316f140000 pid=5231 /usr/bin/wget net send-data write-file guuid=5484e62c-1900-0000-bde0-5d31a1130000 pid=5025->guuid=d0b1e935-1a00-0000-bde0-5d316f140000 pid=5231 execve guuid=d1d2076d-1a00-0000-bde0-5d3170140000 pid=5232 /usr/bin/chmod guuid=5484e62c-1900-0000-bde0-5d31a1130000 pid=5025->guuid=d1d2076d-1a00-0000-bde0-5d3170140000 pid=5232 execve guuid=4c4a646d-1a00-0000-bde0-5d3171140000 pid=5233 /usr/bin/dash guuid=5484e62c-1900-0000-bde0-5d31a1130000 pid=5025->guuid=4c4a646d-1a00-0000-bde0-5d3171140000 pid=5233 clone guuid=4fd83670-1a00-0000-bde0-5d3173140000 pid=5235 /usr/bin/wget net send-data write-file guuid=5484e62c-1900-0000-bde0-5d31a1130000 pid=5025->guuid=4fd83670-1a00-0000-bde0-5d3173140000 pid=5235 execve guuid=057a70a6-1a00-0000-bde0-5d3174140000 pid=5236 /usr/bin/chmod guuid=5484e62c-1900-0000-bde0-5d31a1130000 pid=5025->guuid=057a70a6-1a00-0000-bde0-5d3174140000 pid=5236 execve guuid=e0daeaaa-1a00-0000-bde0-5d3175140000 pid=5237 /usr/bin/dash guuid=5484e62c-1900-0000-bde0-5d31a1130000 pid=5025->guuid=e0daeaaa-1a00-0000-bde0-5d3175140000 pid=5237 clone guuid=74ccadac-1a00-0000-bde0-5d3177140000 pid=5239 /usr/bin/wget net send-data write-file guuid=5484e62c-1900-0000-bde0-5d31a1130000 pid=5025->guuid=74ccadac-1a00-0000-bde0-5d3177140000 pid=5239 execve guuid=b97878f2-1a00-0000-bde0-5d3178140000 pid=5240 /usr/bin/chmod guuid=5484e62c-1900-0000-bde0-5d31a1130000 pid=5025->guuid=b97878f2-1a00-0000-bde0-5d3178140000 pid=5240 execve guuid=6194c3f2-1a00-0000-bde0-5d3179140000 pid=5241 /usr/bin/dash guuid=5484e62c-1900-0000-bde0-5d31a1130000 pid=5025->guuid=6194c3f2-1a00-0000-bde0-5d3179140000 pid=5241 clone guuid=dd9792f3-1a00-0000-bde0-5d317b140000 pid=5243 /usr/bin/wget net send-data write-file guuid=5484e62c-1900-0000-bde0-5d31a1130000 pid=5025->guuid=dd9792f3-1a00-0000-bde0-5d317b140000 pid=5243 execve guuid=851c1231-1b00-0000-bde0-5d3182140000 pid=5250 /usr/bin/chmod guuid=5484e62c-1900-0000-bde0-5d31a1130000 pid=5025->guuid=851c1231-1b00-0000-bde0-5d3182140000 pid=5250 execve guuid=1f039131-1b00-0000-bde0-5d3183140000 pid=5251 /usr/bin/dash guuid=5484e62c-1900-0000-bde0-5d31a1130000 pid=5025->guuid=1f039131-1b00-0000-bde0-5d3183140000 pid=5251 clone 58517d70-7b02-5fe6-86d3-049c9f17a9ed 103.176.20.59:80 guuid=5f125733-1900-0000-bde0-5d31be130000 pid=5054->58517d70-7b02-5fe6-86d3-049c9f17a9ed send: 137B guuid=462565b5-1900-0000-bde0-5d3164140000 pid=5220->58517d70-7b02-5fe6-86d3-049c9f17a9ed send: 137B guuid=d0b1e935-1a00-0000-bde0-5d316f140000 pid=5231->58517d70-7b02-5fe6-86d3-049c9f17a9ed send: 136B guuid=4fd83670-1a00-0000-bde0-5d3173140000 pid=5235->58517d70-7b02-5fe6-86d3-049c9f17a9ed send: 137B guuid=74ccadac-1a00-0000-bde0-5d3177140000 pid=5239->58517d70-7b02-5fe6-86d3-049c9f17a9ed send: 137B guuid=dd9792f3-1a00-0000-bde0-5d317b140000 pid=5243->58517d70-7b02-5fe6-86d3-049c9f17a9ed send: 131B
Threat name:
Win32.Trojan.Egairtigado
Status:
Malicious
First seen:
2025-08-23 14:43:36 UTC
File Type:
Text (Shell)
AV detection:
14 of 38 (36.84%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
credential_access defense_evasion discovery linux
Behaviour
Reads runtime system information
System Network Configuration Discovery
Writes file to tmp directory
Changes its process name
Reads system network configuration
Reads process memory
Enumerates running processes
Reads MAC address of network interface
Reads system routing table
File and Directory Permissions Modification
Executes dropped EXE
Renames itself
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh 331027ed453f9de1d2640644a421b727408dddc443db65076e7d91fedc51e09c

(this sample)

  
Delivery method
Distributed via web download

Comments