MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 3839ae560b31338ffea089499f316081605f4951cd980ae85354d370b797a1b3. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: 3839ae560b31338ffea089499f316081605f4951cd980ae85354d370b797a1b3
SHA3-384 hash: 4ef071ad8ac7ca7d1fc33da45026df1dbe7597f77f812c9db9e91652633382dc0688622ed19f9aebcbf312205b96a34a
SHA1 hash: 6d9e42ab676515b997ed923202ef34a6cbc02e49
MD5 hash: e920e8e746881012e701f528bd5f7e95
humanhash: magazine-speaker-mockingbird-music
File name:tbk
Download: download sample
Signature Mirai
File size:677 bytes
First seen:2026-03-25 03:32:39 UTC
Last seen:2026-03-25 06:39:57 UTC
File type: sh
MIME type:text/plain
ssdeep 12:BN1n1UoFaJewzpOWNn+031nviEU5JewtXpZt+JGy:7qB6BK
TLSH T16D018FD20332EB75B8957D1970B1758A63C7FEA4219E6F8CF9B8492114598B0B801B69
Magika txt
Reporter abuse_ch
Tags:sh
URLMalware sample (SHA256 hash)SignatureTags
http://162.248.102.107/n2/armv5l471a9b058e62d97215ef1dd291d8a20f7993cc2b2d925989c1e351c5f539bc52 Miraiarm elf mirai ua-wget

Intelligence


File Origin
# of uploads :
72
# of downloads :
23
Origin country :
DE DE
Vendor Threat Intelligence
No detections
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
busybox evasive
Status:
terminated
Behavior Graph:
%3 guuid=eada9bc9-1600-0000-8a77-ab35fa0d0000 pid=3578 /usr/bin/sudo guuid=93092acc-1600-0000-8a77-ab35020e0000 pid=3586 /tmp/sample.bin guuid=eada9bc9-1600-0000-8a77-ab35fa0d0000 pid=3578->guuid=93092acc-1600-0000-8a77-ab35020e0000 pid=3586 execve guuid=b9016ecc-1600-0000-8a77-ab35040e0000 pid=3588 /usr/bin/wget net send-data write-file guuid=93092acc-1600-0000-8a77-ab35020e0000 pid=3586->guuid=b9016ecc-1600-0000-8a77-ab35040e0000 pid=3588 execve guuid=e1f1b3e2-1600-0000-8a77-ab35480e0000 pid=3656 /usr/bin/chmod guuid=93092acc-1600-0000-8a77-ab35020e0000 pid=3586->guuid=e1f1b3e2-1600-0000-8a77-ab35480e0000 pid=3656 execve guuid=503933e3-1600-0000-8a77-ab354a0e0000 pid=3658 /usr/bin/dash guuid=93092acc-1600-0000-8a77-ab35020e0000 pid=3586->guuid=503933e3-1600-0000-8a77-ab354a0e0000 pid=3658 clone guuid=abf6c0e4-1600-0000-8a77-ab354e0e0000 pid=3662 /usr/bin/wget net send-data write-file guuid=93092acc-1600-0000-8a77-ab35020e0000 pid=3586->guuid=abf6c0e4-1600-0000-8a77-ab354e0e0000 pid=3662 execve guuid=65eeb9fa-1600-0000-8a77-ab35630e0000 pid=3683 /usr/bin/chmod guuid=93092acc-1600-0000-8a77-ab35020e0000 pid=3586->guuid=65eeb9fa-1600-0000-8a77-ab35630e0000 pid=3683 execve guuid=e95cfdfa-1600-0000-8a77-ab35650e0000 pid=3685 /usr/bin/dash guuid=93092acc-1600-0000-8a77-ab35020e0000 pid=3586->guuid=e95cfdfa-1600-0000-8a77-ab35650e0000 pid=3685 clone guuid=98bdd3fc-1600-0000-8a77-ab356c0e0000 pid=3692 /usr/bin/wget net send-data write-file guuid=93092acc-1600-0000-8a77-ab35020e0000 pid=3586->guuid=98bdd3fc-1600-0000-8a77-ab356c0e0000 pid=3692 execve guuid=b6c18516-1700-0000-8a77-ab35b60e0000 pid=3766 /usr/bin/chmod guuid=93092acc-1600-0000-8a77-ab35020e0000 pid=3586->guuid=b6c18516-1700-0000-8a77-ab35b60e0000 pid=3766 execve guuid=2aeeda16-1700-0000-8a77-ab35b80e0000 pid=3768 /dev/x86 net guuid=93092acc-1600-0000-8a77-ab35020e0000 pid=3586->guuid=2aeeda16-1700-0000-8a77-ab35b80e0000 pid=3768 execve guuid=e3217718-1700-0000-8a77-ab35be0e0000 pid=3774 /usr/bin/wget net send-data write-file guuid=93092acc-1600-0000-8a77-ab35020e0000 pid=3586->guuid=e3217718-1700-0000-8a77-ab35be0e0000 pid=3774 execve guuid=735ee92d-1700-0000-8a77-ab351b0f0000 pid=3867 /usr/bin/chmod guuid=93092acc-1600-0000-8a77-ab35020e0000 pid=3586->guuid=735ee92d-1700-0000-8a77-ab351b0f0000 pid=3867 execve guuid=e1e13b2e-1700-0000-8a77-ab351d0f0000 pid=3869 /usr/bin/dash guuid=93092acc-1600-0000-8a77-ab35020e0000 pid=3586->guuid=e1e13b2e-1700-0000-8a77-ab351d0f0000 pid=3869 clone guuid=406fe52e-1700-0000-8a77-ab35210f0000 pid=3873 /usr/bin/rm delete-file guuid=93092acc-1600-0000-8a77-ab35020e0000 pid=3586->guuid=406fe52e-1700-0000-8a77-ab35210f0000 pid=3873 execve guuid=b76c402f-1700-0000-8a77-ab35230f0000 pid=3875 /usr/bin/busybox net send-data write-file guuid=93092acc-1600-0000-8a77-ab35020e0000 pid=3586->guuid=b76c402f-1700-0000-8a77-ab35230f0000 pid=3875 execve guuid=92d3de43-1700-0000-8a77-ab35640f0000 pid=3940 /usr/bin/chmod guuid=93092acc-1600-0000-8a77-ab35020e0000 pid=3586->guuid=92d3de43-1700-0000-8a77-ab35640f0000 pid=3940 execve guuid=b0f14f44-1700-0000-8a77-ab35680f0000 pid=3944 /usr/bin/dash guuid=93092acc-1600-0000-8a77-ab35020e0000 pid=3586->guuid=b0f14f44-1700-0000-8a77-ab35680f0000 pid=3944 clone guuid=a6e05b45-1700-0000-8a77-ab356b0f0000 pid=3947 /usr/bin/busybox net send-data write-file guuid=93092acc-1600-0000-8a77-ab35020e0000 pid=3586->guuid=a6e05b45-1700-0000-8a77-ab356b0f0000 pid=3947 execve guuid=431c7f5a-1700-0000-8a77-ab359f0f0000 pid=3999 /usr/bin/chmod guuid=93092acc-1600-0000-8a77-ab35020e0000 pid=3586->guuid=431c7f5a-1700-0000-8a77-ab359f0f0000 pid=3999 execve guuid=b544f75a-1700-0000-8a77-ab35a10f0000 pid=4001 /usr/bin/dash guuid=93092acc-1600-0000-8a77-ab35020e0000 pid=3586->guuid=b544f75a-1700-0000-8a77-ab35a10f0000 pid=4001 clone guuid=3422db5b-1700-0000-8a77-ab35a50f0000 pid=4005 /usr/bin/busybox net send-data write-file guuid=93092acc-1600-0000-8a77-ab35020e0000 pid=3586->guuid=3422db5b-1700-0000-8a77-ab35a50f0000 pid=4005 execve guuid=b8b08170-1700-0000-8a77-ab35d60f0000 pid=4054 /usr/bin/chmod guuid=93092acc-1600-0000-8a77-ab35020e0000 pid=3586->guuid=b8b08170-1700-0000-8a77-ab35d60f0000 pid=4054 execve guuid=d132f670-1700-0000-8a77-ab35d70f0000 pid=4055 /dev/x86 net guuid=93092acc-1600-0000-8a77-ab35020e0000 pid=3586->guuid=d132f670-1700-0000-8a77-ab35d70f0000 pid=4055 execve guuid=2c229372-1700-0000-8a77-ab35dd0f0000 pid=4061 /usr/bin/busybox net send-data write-file guuid=93092acc-1600-0000-8a77-ab35020e0000 pid=3586->guuid=2c229372-1700-0000-8a77-ab35dd0f0000 pid=4061 execve guuid=0479bd87-1700-0000-8a77-ab350f100000 pid=4111 /usr/bin/chmod guuid=93092acc-1600-0000-8a77-ab35020e0000 pid=3586->guuid=0479bd87-1700-0000-8a77-ab350f100000 pid=4111 execve guuid=7b271288-1700-0000-8a77-ab3512100000 pid=4114 /usr/bin/dash guuid=93092acc-1600-0000-8a77-ab35020e0000 pid=3586->guuid=7b271288-1700-0000-8a77-ab3512100000 pid=4114 clone guuid=83d4de88-1700-0000-8a77-ab3516100000 pid=4118 /usr/bin/rm delete-file guuid=93092acc-1600-0000-8a77-ab35020e0000 pid=3586->guuid=83d4de88-1700-0000-8a77-ab3516100000 pid=4118 execve bc540670-df21-5e67-8317-a619e75c09f8 162.248.102.107:80 guuid=b9016ecc-1600-0000-8a77-ab35040e0000 pid=3588->bc540670-df21-5e67-8317-a619e75c09f8 send: 137B guuid=abf6c0e4-1600-0000-8a77-ab354e0e0000 pid=3662->bc540670-df21-5e67-8317-a619e75c09f8 send: 137B guuid=98bdd3fc-1600-0000-8a77-ab356c0e0000 pid=3692->bc540670-df21-5e67-8317-a619e75c09f8 send: 136B 8b0a01dc-0728-52c1-8024-c4ba7801b8d6 8.8.8.8:53 guuid=2aeeda16-1700-0000-8a77-ab35b80e0000 pid=3768->8b0a01dc-0728-52c1-8024-c4ba7801b8d6 con guuid=96856e18-1700-0000-8a77-ab35bd0e0000 pid=3773 /dev/x86 dns net send-data zombie guuid=2aeeda16-1700-0000-8a77-ab35b80e0000 pid=3768->guuid=96856e18-1700-0000-8a77-ab35bd0e0000 pid=3773 clone guuid=96856e18-1700-0000-8a77-ab35bd0e0000 pid=3773->8b0a01dc-0728-52c1-8024-c4ba7801b8d6 con 54d92a3b-1447-55af-b534-047898c60c8d 1.1.1.1:53 guuid=96856e18-1700-0000-8a77-ab35bd0e0000 pid=3773->54d92a3b-1447-55af-b534-047898c60c8d send: 26B d6c89315-7d56-5ab3-a56e-238b47895e2b ddos.lat:123 guuid=96856e18-1700-0000-8a77-ab35bd0e0000 pid=3773->d6c89315-7d56-5ab3-a56e-238b47895e2b send: 4B f00d2946-fe0c-5891-8023-214556343512 ddos.lat:25565 guuid=96856e18-1700-0000-8a77-ab35bd0e0000 pid=3773->f00d2946-fe0c-5891-8023-214556343512 send: 139B guuid=c2498718-1700-0000-8a77-ab35c00e0000 pid=3776 /dev/x86 guuid=96856e18-1700-0000-8a77-ab35bd0e0000 pid=3773->guuid=c2498718-1700-0000-8a77-ab35c00e0000 pid=3776 clone guuid=e3217718-1700-0000-8a77-ab35be0e0000 pid=3774->bc540670-df21-5e67-8317-a619e75c09f8 send: 139B guuid=ba8b9518-1700-0000-8a77-ab35c10e0000 pid=3777 /dev/x86 send-data guuid=c2498718-1700-0000-8a77-ab35c00e0000 pid=3776->guuid=ba8b9518-1700-0000-8a77-ab35c10e0000 pid=3777 clone 119fdfbb-af05-553e-93e0-4a8214b03fe0 127.0.0.1:58012 guuid=ba8b9518-1700-0000-8a77-ab35c10e0000 pid=3777->119fdfbb-af05-553e-93e0-4a8214b03fe0 send: 1B guuid=b76c402f-1700-0000-8a77-ab35230f0000 pid=3875->bc540670-df21-5e67-8317-a619e75c09f8 send: 85B guuid=a6e05b45-1700-0000-8a77-ab356b0f0000 pid=3947->bc540670-df21-5e67-8317-a619e75c09f8 send: 85B guuid=3422db5b-1700-0000-8a77-ab35a50f0000 pid=4005->bc540670-df21-5e67-8317-a619e75c09f8 send: 84B guuid=d132f670-1700-0000-8a77-ab35d70f0000 pid=4055->8b0a01dc-0728-52c1-8024-c4ba7801b8d6 con guuid=bdba8872-1700-0000-8a77-ab35dc0f0000 pid=4060 /dev/x86 net send-data zombie guuid=d132f670-1700-0000-8a77-ab35d70f0000 pid=4055->guuid=bdba8872-1700-0000-8a77-ab35dc0f0000 pid=4060 clone guuid=bdba8872-1700-0000-8a77-ab35dc0f0000 pid=4060->8b0a01dc-0728-52c1-8024-c4ba7801b8d6 con 307db2dd-32a0-52fe-a412-5478b0ff6eae 127.0.0.1:63464 guuid=bdba8872-1700-0000-8a77-ab35dc0f0000 pid=4060->307db2dd-32a0-52fe-a412-5478b0ff6eae send: 2B guuid=2c229372-1700-0000-8a77-ab35dd0f0000 pid=4061->bc540670-df21-5e67-8317-a619e75c09f8 send: 87B
Threat name:
Script.Downloader.Heuristic
Status:
Malicious
First seen:
2026-03-25 04:26:41 UTC
File Type:
Text (Shell)
AV detection:
4 of 24 (16.67%)
Threat level:
  2/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Modifies registry class
Suspicious use of SetWindowsHookEx
Enumerates physical storage devices
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh 3839ae560b31338ffea089499f316081605f4951cd980ae85354d370b797a1b3

(this sample)

  
Delivery method
Distributed via web download

Comments