MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 38878fae703702ac7413ece24b9b4fc2869c5fc5345412c949553ef874214773. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 6


Intelligence 6 IOCs YARA 1 File information Comments

SHA256 hash: 38878fae703702ac7413ece24b9b4fc2869c5fc5345412c949553ef874214773
SHA3-384 hash: 53e44a6345e9a070bf52437b46cf9869436973fae770ecb6909522db3195b7783960cbb447c2ecd49df628ebe3d38a58
SHA1 hash: 16412c082d01d916f6695f9baa0de14a47b7c082
MD5 hash: a195f12e8f53d4fe40f337eb0c2de3d7
humanhash: lemon-don-eight-robin
File name:g
Download: download sample
Signature Mirai
File size:705 bytes
First seen:2025-06-19 04:41:57 UTC
Last seen:Never
File type: sh
MIME type:text/plain
ssdeep 12:3rWKIw+jn5ZMoOF7+MB0joVPu2OjoVPu2NDNkaFNdoVPuDyTjoVPuDygDNkaFNd:yRl5zOt+MB0sxJxDkKNSxSx0kKNd
TLSH T17101A7CF41A5CD727C814DEE75935A15A8C6C9C90BCB8FC5A08D01BAA5CCD0D71A2E79
Magika txt
Reporter abuse_ch
Tags:sh
URLMalware sample (SHA256 hash)SignatureTags
http://94.26.90.217/vv/armv4la82594f321a14d22c63b44b8b3f4e5dcb725aeda14db201cfe59d6b37cb8093f Miraielf gafgyt mirai ua-wget
http://94.26.90.217/vv/armv7lae5dbccdfcd0e48e2065b462be5879d1c103e3dc9c553ce8eb319c6385580d78 Miraielf gafgyt mirai ua-wget

Intelligence


File Origin
# of uploads :
1
# of downloads :
72
Origin country :
DE DE
Vendor Threat Intelligence
Status:
terminated
Behavior Graph:
%3 guuid=3848ae16-1900-0000-4ddf-a17b08090000 pid=2312 /usr/bin/sudo guuid=ddc0c018-1900-0000-4ddf-a17b0e090000 pid=2318 /tmp/sample.bin guuid=3848ae16-1900-0000-4ddf-a17b08090000 pid=2312->guuid=ddc0c018-1900-0000-4ddf-a17b0e090000 pid=2318 execve guuid=5c413719-1900-0000-4ddf-a17b10090000 pid=2320 /usr/bin/dash guuid=ddc0c018-1900-0000-4ddf-a17b0e090000 pid=2318->guuid=5c413719-1900-0000-4ddf-a17b10090000 pid=2320 clone guuid=20c7131a-1900-0000-4ddf-a17b18090000 pid=2328 /usr/bin/rm delete-file guuid=ddc0c018-1900-0000-4ddf-a17b0e090000 pid=2318->guuid=20c7131a-1900-0000-4ddf-a17b18090000 pid=2328 execve guuid=1d21501a-1900-0000-4ddf-a17b1a090000 pid=2330 /usr/bin/rm delete-file guuid=ddc0c018-1900-0000-4ddf-a17b0e090000 pid=2318->guuid=1d21501a-1900-0000-4ddf-a17b1a090000 pid=2330 execve guuid=5f2d8f1a-1900-0000-4ddf-a17b1c090000 pid=2332 /usr/bin/rm delete-file guuid=ddc0c018-1900-0000-4ddf-a17b0e090000 pid=2318->guuid=5f2d8f1a-1900-0000-4ddf-a17b1c090000 pid=2332 execve guuid=d514cd1a-1900-0000-4ddf-a17b1d090000 pid=2333 /usr/bin/dash guuid=ddc0c018-1900-0000-4ddf-a17b0e090000 pid=2318->guuid=d514cd1a-1900-0000-4ddf-a17b1d090000 pid=2333 clone guuid=8c596c1b-1900-0000-4ddf-a17b1f090000 pid=2335 /usr/bin/dash guuid=ddc0c018-1900-0000-4ddf-a17b0e090000 pid=2318->guuid=8c596c1b-1900-0000-4ddf-a17b1f090000 pid=2335 clone guuid=e5fae81b-1900-0000-4ddf-a17b21090000 pid=2337 /usr/bin/dash guuid=ddc0c018-1900-0000-4ddf-a17b0e090000 pid=2318->guuid=e5fae81b-1900-0000-4ddf-a17b21090000 pid=2337 clone guuid=4b7db769-1900-0000-4ddf-a17bbd090000 pid=2493 /usr/bin/chmod guuid=ddc0c018-1900-0000-4ddf-a17b0e090000 pid=2318->guuid=4b7db769-1900-0000-4ddf-a17bbd090000 pid=2493 execve guuid=65eb206a-1900-0000-4ddf-a17bbf090000 pid=2495 /usr/bin/dash guuid=ddc0c018-1900-0000-4ddf-a17b0e090000 pid=2318->guuid=65eb206a-1900-0000-4ddf-a17bbf090000 pid=2495 clone guuid=db50b46b-1900-0000-4ddf-a17bc3090000 pid=2499 /usr/bin/dash guuid=ddc0c018-1900-0000-4ddf-a17b0e090000 pid=2318->guuid=db50b46b-1900-0000-4ddf-a17bc3090000 pid=2499 clone guuid=6c031bcb-1900-0000-4ddf-a17bb00a0000 pid=2736 /usr/bin/chmod guuid=ddc0c018-1900-0000-4ddf-a17b0e090000 pid=2318->guuid=6c031bcb-1900-0000-4ddf-a17bb00a0000 pid=2736 execve guuid=a5f560cb-1900-0000-4ddf-a17bb20a0000 pid=2738 /usr/bin/dash guuid=ddc0c018-1900-0000-4ddf-a17b0e090000 pid=2318->guuid=a5f560cb-1900-0000-4ddf-a17bb20a0000 pid=2738 clone guuid=c49f4319-1900-0000-4ddf-a17b12090000 pid=2322 /usr/bin/cat guuid=5c413719-1900-0000-4ddf-a17b10090000 pid=2320->guuid=c49f4319-1900-0000-4ddf-a17b12090000 pid=2322 execve guuid=9e394919-1900-0000-4ddf-a17b13090000 pid=2323 /usr/bin/grep guuid=5c413719-1900-0000-4ddf-a17b10090000 pid=2320->guuid=9e394919-1900-0000-4ddf-a17b13090000 pid=2323 execve guuid=abae4d19-1900-0000-4ddf-a17b14090000 pid=2324 /usr/bin/grep guuid=5c413719-1900-0000-4ddf-a17b10090000 pid=2320->guuid=abae4d19-1900-0000-4ddf-a17b14090000 pid=2324 execve guuid=cf7b5219-1900-0000-4ddf-a17b15090000 pid=2325 /usr/bin/grep guuid=5c413719-1900-0000-4ddf-a17b10090000 pid=2320->guuid=cf7b5219-1900-0000-4ddf-a17b15090000 pid=2325 execve guuid=b5345619-1900-0000-4ddf-a17b16090000 pid=2326 /usr/bin/cut guuid=5c413719-1900-0000-4ddf-a17b10090000 pid=2320->guuid=b5345619-1900-0000-4ddf-a17b16090000 pid=2326 execve guuid=7203df1a-1900-0000-4ddf-a17b1e090000 pid=2334 /usr/bin/cp write-file guuid=d514cd1a-1900-0000-4ddf-a17b1d090000 pid=2333->guuid=7203df1a-1900-0000-4ddf-a17b1e090000 pid=2334 execve guuid=7950761b-1900-0000-4ddf-a17b20090000 pid=2336 /usr/bin/chmod guuid=8c596c1b-1900-0000-4ddf-a17b1f090000 pid=2335->guuid=7950761b-1900-0000-4ddf-a17b20090000 pid=2336 execve guuid=8a7ef61b-1900-0000-4ddf-a17b22090000 pid=2338 /usr/bin/wget net send-data write-file guuid=e5fae81b-1900-0000-4ddf-a17b21090000 pid=2337->guuid=8a7ef61b-1900-0000-4ddf-a17b22090000 pid=2338 execve fbb9a6c5-a595-5199-8d51-c1632aa72f16 94.26.90.217:80 guuid=8a7ef61b-1900-0000-4ddf-a17b22090000 pid=2338->fbb9a6c5-a595-5199-8d51-c1632aa72f16 send: 136B guuid=6348ba6b-1900-0000-4ddf-a17bc4090000 pid=2500 /usr/bin/wget net send-data write-file guuid=db50b46b-1900-0000-4ddf-a17bc3090000 pid=2499->guuid=6348ba6b-1900-0000-4ddf-a17bc4090000 pid=2500 execve guuid=6348ba6b-1900-0000-4ddf-a17bc4090000 pid=2500->fbb9a6c5-a595-5199-8d51-c1632aa72f16 send: 136B
Threat name:
Script.Trojan.Multiverze
Status:
Malicious
First seen:
2025-06-19 07:53:10 UTC
AV detection:
8 of 24 (33.33%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Modifies registry class
Suspicious use of SetWindowsHookEx
Enumerates physical storage devices
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:ach_202412_suspect_bash_script
Author:abuse.ch
Description:Detects suspicious Linux bash scripts

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh 38878fae703702ac7413ece24b9b4fc2869c5fc5345412c949553ef874214773

(this sample)

  
Delivery method
Distributed via web download

Comments