MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 38960238b53e624bb0fdbffb2a9f85b7590943e293d64309384f817215d6df26. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: 38960238b53e624bb0fdbffb2a9f85b7590943e293d64309384f817215d6df26
SHA3-384 hash: db55a86a798b8ec1b998ca9ef62853ab319b20f19f16596d5af2329d184d0394d950bc3062b2d030658584963cef659b
SHA1 hash: 270eced38dea5d43599aa8d26007f24babc49105
MD5 hash: eef4e6c462685e78b761ff767f4597ad
humanhash: early-missouri-zebra-sad
File name:c.sh
Download: download sample
Signature Mirai
File size:789 bytes
First seen:2025-10-06 05:44:05 UTC
Last seen:Never
File type: sh
MIME type:text/plain
ssdeep 24:3J3CM34hNI77xKrpXMFWP180l3VtCq3XrMNA:/h12XTtLR
TLSH T1EF0121CCA5A27F439E4DCE0EF966C8889004EAFBB460CE25E05B583D98D9B09B015376
Magika shell
Reporter abuse_ch
Tags:sh
URLMalware sample (SHA256 hash)SignatureTags
http://151.242.30.16/bins/arm0e371b80ebbebcc1b4bb3a73e764aeeb8dde38bda794c397fa7530194429d066 Miraiclouddzy mirai scammer traitor
http://151.242.30.16/bins/arm59c258ebe58fff46bed7bd379b8a3d5cd82bf5a156bf5ab1c0b411dec5dd1c7ca Miraiclouddzy mirai scammer traitor
http://151.242.30.16/bins/arm6b3a9da4cc0535870cdf1889ec850416e194148c7f331309fd545a830632e6971 Miraiclouddzy mirai scammer traitor
http://151.242.30.16/bins/arm7b7c8f245ac74d57b04418feb611adb94f8806539744f94c734690ebb135b43cb Miraiclouddzy mirai scammer traitor
http://151.242.30.16/bins/m68k76bc97f31cc897e6f0138d1d0abee829889c2a172cdea81484002b501b3e8c6b Miraiclouddzy mirai scammer traitor
http://151.242.30.16/bins/mips2414f0cfbbd246cf62e0d68a6154a18a7ed465831e6a1ce466f3e03d60e43519 Miraiclouddzy mirai scammer traitor
http://151.242.30.16/bins/mpsln/an/aelf ua-wget
http://151.242.30.16/bins/ppcd3d51b2147cca08a91fb74721dc3445c6ae820d4fab93d401c09de033bd04c8b Miraiclouddzy mirai scammer traitor
http://151.242.30.16/bins/sh42bc77f586519486fa984da43f51fd4f88d08950f3f5a7fea7276746f332d1352 Miraiclouddzy mirai scammer traitor
http://151.242.30.16/bins/spc13c97d8f958d27a1953d9bea35c47ea33d4cfe8bfbbf0a8634c63546bcbcdc5c Miraiclouddzy mirai payback scammer
http://151.242.30.16/bins/x86e348673daacb22312e0533deeb5078cf59ceac7f7cd86ac33f07e8da399c35e8 Miraiclouddzy mirai scammer traitor
http://151.242.30.16/bins/x86_64d11afce47879e0e096268d8c5e2cb4dc8d01a780142a27c3fa9989944553ebb4 Miraiclouddzy mirai scammer traitor

Intelligence


File Origin
# of uploads :
1
# of downloads :
54
Origin country :
DE DE
Vendor Threat Intelligence
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
evasive mirai
Verdict:
Malicious
File Type:
ps1
First seen:
2025-10-05T10:27:00Z UTC
Last seen:
2025-10-06T11:06:00Z UTC
Hits:
~10
Status:
terminated
Behavior Graph:
%3 guuid=6ea70549-4d00-0000-fa22-3ce6a3030000 pid=931 /usr/bin/sudo guuid=17f0d84b-4d00-0000-fa22-3ce6a4030000 pid=932 /tmp/sample.bin guuid=6ea70549-4d00-0000-fa22-3ce6a3030000 pid=931->guuid=17f0d84b-4d00-0000-fa22-3ce6a4030000 pid=932 execve guuid=d81a3e4c-4d00-0000-fa22-3ce6a5030000 pid=933 /usr/bin/curl net send-data guuid=17f0d84b-4d00-0000-fa22-3ce6a4030000 pid=932->guuid=d81a3e4c-4d00-0000-fa22-3ce6a5030000 pid=933 execve guuid=1614d914-5100-0000-fa22-3ce6a6030000 pid=934 /usr/bin/chmod guuid=17f0d84b-4d00-0000-fa22-3ce6a4030000 pid=932->guuid=1614d914-5100-0000-fa22-3ce6a6030000 pid=934 execve guuid=70dc6515-5100-0000-fa22-3ce6a7030000 pid=935 /usr/bin/dash guuid=17f0d84b-4d00-0000-fa22-3ce6a4030000 pid=932->guuid=70dc6515-5100-0000-fa22-3ce6a7030000 pid=935 clone guuid=67a57e15-5100-0000-fa22-3ce6a8030000 pid=936 /usr/bin/curl net send-data guuid=17f0d84b-4d00-0000-fa22-3ce6a4030000 pid=932->guuid=67a57e15-5100-0000-fa22-3ce6a8030000 pid=936 execve guuid=db0d964d-5100-0000-fa22-3ce6a9030000 pid=937 /usr/bin/chmod guuid=17f0d84b-4d00-0000-fa22-3ce6a4030000 pid=932->guuid=db0d964d-5100-0000-fa22-3ce6a9030000 pid=937 execve guuid=5259174e-5100-0000-fa22-3ce6aa030000 pid=938 /usr/bin/dash guuid=17f0d84b-4d00-0000-fa22-3ce6a4030000 pid=932->guuid=5259174e-5100-0000-fa22-3ce6aa030000 pid=938 clone guuid=55c53c4e-5100-0000-fa22-3ce6ab030000 pid=939 /usr/bin/curl net send-data guuid=17f0d84b-4d00-0000-fa22-3ce6a4030000 pid=932->guuid=55c53c4e-5100-0000-fa22-3ce6ab030000 pid=939 execve guuid=080eff5c-5100-0000-fa22-3ce6ac030000 pid=940 /usr/bin/chmod guuid=17f0d84b-4d00-0000-fa22-3ce6a4030000 pid=932->guuid=080eff5c-5100-0000-fa22-3ce6ac030000 pid=940 execve guuid=e8f6785d-5100-0000-fa22-3ce6ad030000 pid=941 /usr/bin/dash guuid=17f0d84b-4d00-0000-fa22-3ce6a4030000 pid=932->guuid=e8f6785d-5100-0000-fa22-3ce6ad030000 pid=941 clone guuid=3d94955d-5100-0000-fa22-3ce6ae030000 pid=942 /usr/bin/curl net send-data guuid=17f0d84b-4d00-0000-fa22-3ce6a4030000 pid=932->guuid=3d94955d-5100-0000-fa22-3ce6ae030000 pid=942 execve guuid=3c53ba6e-5100-0000-fa22-3ce6af030000 pid=943 /usr/bin/chmod guuid=17f0d84b-4d00-0000-fa22-3ce6a4030000 pid=932->guuid=3c53ba6e-5100-0000-fa22-3ce6af030000 pid=943 execve guuid=cab1486f-5100-0000-fa22-3ce6b0030000 pid=944 /usr/bin/dash guuid=17f0d84b-4d00-0000-fa22-3ce6a4030000 pid=932->guuid=cab1486f-5100-0000-fa22-3ce6b0030000 pid=944 clone guuid=8347666f-5100-0000-fa22-3ce6b1030000 pid=945 /usr/bin/curl net send-data guuid=17f0d84b-4d00-0000-fa22-3ce6a4030000 pid=932->guuid=8347666f-5100-0000-fa22-3ce6b1030000 pid=945 execve guuid=ce253f7f-5100-0000-fa22-3ce6b2030000 pid=946 /usr/bin/chmod guuid=17f0d84b-4d00-0000-fa22-3ce6a4030000 pid=932->guuid=ce253f7f-5100-0000-fa22-3ce6b2030000 pid=946 execve guuid=44c8d37f-5100-0000-fa22-3ce6b3030000 pid=947 /usr/bin/dash guuid=17f0d84b-4d00-0000-fa22-3ce6a4030000 pid=932->guuid=44c8d37f-5100-0000-fa22-3ce6b3030000 pid=947 clone guuid=c279eb7f-5100-0000-fa22-3ce6b4030000 pid=948 /usr/bin/curl net send-data guuid=17f0d84b-4d00-0000-fa22-3ce6a4030000 pid=932->guuid=c279eb7f-5100-0000-fa22-3ce6b4030000 pid=948 execve guuid=604228c8-5100-0000-fa22-3ce6b5030000 pid=949 /usr/bin/chmod guuid=17f0d84b-4d00-0000-fa22-3ce6a4030000 pid=932->guuid=604228c8-5100-0000-fa22-3ce6b5030000 pid=949 execve guuid=061ab8c8-5100-0000-fa22-3ce6b6030000 pid=950 /usr/bin/dash guuid=17f0d84b-4d00-0000-fa22-3ce6a4030000 pid=932->guuid=061ab8c8-5100-0000-fa22-3ce6b6030000 pid=950 clone guuid=f59cdcc8-5100-0000-fa22-3ce6b7030000 pid=951 /usr/bin/curl net send-data guuid=17f0d84b-4d00-0000-fa22-3ce6a4030000 pid=932->guuid=f59cdcc8-5100-0000-fa22-3ce6b7030000 pid=951 execve guuid=a5b68dd0-5100-0000-fa22-3ce6b8030000 pid=952 /usr/bin/chmod guuid=17f0d84b-4d00-0000-fa22-3ce6a4030000 pid=932->guuid=a5b68dd0-5100-0000-fa22-3ce6b8030000 pid=952 execve guuid=04fa0fd1-5100-0000-fa22-3ce6b9030000 pid=953 /usr/bin/dash guuid=17f0d84b-4d00-0000-fa22-3ce6a4030000 pid=932->guuid=04fa0fd1-5100-0000-fa22-3ce6b9030000 pid=953 clone guuid=a80f2ed1-5100-0000-fa22-3ce6ba030000 pid=954 /usr/bin/curl net send-data guuid=17f0d84b-4d00-0000-fa22-3ce6a4030000 pid=932->guuid=a80f2ed1-5100-0000-fa22-3ce6ba030000 pid=954 execve guuid=b04d5ade-5100-0000-fa22-3ce6bb030000 pid=955 /usr/bin/chmod guuid=17f0d84b-4d00-0000-fa22-3ce6a4030000 pid=932->guuid=b04d5ade-5100-0000-fa22-3ce6bb030000 pid=955 execve guuid=b4bce4de-5100-0000-fa22-3ce6bc030000 pid=956 /usr/bin/dash guuid=17f0d84b-4d00-0000-fa22-3ce6a4030000 pid=932->guuid=b4bce4de-5100-0000-fa22-3ce6bc030000 pid=956 clone guuid=1b7705df-5100-0000-fa22-3ce6bd030000 pid=957 /usr/bin/curl net send-data guuid=17f0d84b-4d00-0000-fa22-3ce6a4030000 pid=932->guuid=1b7705df-5100-0000-fa22-3ce6bd030000 pid=957 execve guuid=e011d0eb-5100-0000-fa22-3ce6be030000 pid=958 /usr/bin/chmod guuid=17f0d84b-4d00-0000-fa22-3ce6a4030000 pid=932->guuid=e011d0eb-5100-0000-fa22-3ce6be030000 pid=958 execve guuid=e98d52ec-5100-0000-fa22-3ce6bf030000 pid=959 /usr/bin/dash guuid=17f0d84b-4d00-0000-fa22-3ce6a4030000 pid=932->guuid=e98d52ec-5100-0000-fa22-3ce6bf030000 pid=959 clone guuid=11b46bec-5100-0000-fa22-3ce6c0030000 pid=960 /usr/bin/curl net send-data guuid=17f0d84b-4d00-0000-fa22-3ce6a4030000 pid=932->guuid=11b46bec-5100-0000-fa22-3ce6c0030000 pid=960 execve guuid=ec338afb-5100-0000-fa22-3ce6c1030000 pid=961 /usr/bin/chmod guuid=17f0d84b-4d00-0000-fa22-3ce6a4030000 pid=932->guuid=ec338afb-5100-0000-fa22-3ce6c1030000 pid=961 execve guuid=489b15fc-5100-0000-fa22-3ce6c2030000 pid=962 /usr/bin/dash guuid=17f0d84b-4d00-0000-fa22-3ce6a4030000 pid=932->guuid=489b15fc-5100-0000-fa22-3ce6c2030000 pid=962 clone guuid=99892ffc-5100-0000-fa22-3ce6c3030000 pid=963 /usr/bin/curl net send-data guuid=17f0d84b-4d00-0000-fa22-3ce6a4030000 pid=932->guuid=99892ffc-5100-0000-fa22-3ce6c3030000 pid=963 execve guuid=ca944409-5200-0000-fa22-3ce6c4030000 pid=964 /usr/bin/chmod guuid=17f0d84b-4d00-0000-fa22-3ce6a4030000 pid=932->guuid=ca944409-5200-0000-fa22-3ce6c4030000 pid=964 execve guuid=0491ba09-5200-0000-fa22-3ce6c5030000 pid=965 /usr/bin/dash guuid=17f0d84b-4d00-0000-fa22-3ce6a4030000 pid=932->guuid=0491ba09-5200-0000-fa22-3ce6c5030000 pid=965 clone guuid=899bdf09-5200-0000-fa22-3ce6c6030000 pid=966 /usr/bin/curl net send-data guuid=17f0d84b-4d00-0000-fa22-3ce6a4030000 pid=932->guuid=899bdf09-5200-0000-fa22-3ce6c6030000 pid=966 execve guuid=0fcd2316-5200-0000-fa22-3ce6c7030000 pid=967 /usr/bin/chmod guuid=17f0d84b-4d00-0000-fa22-3ce6a4030000 pid=932->guuid=0fcd2316-5200-0000-fa22-3ce6c7030000 pid=967 execve guuid=1239a916-5200-0000-fa22-3ce6c8030000 pid=968 /usr/bin/dash guuid=17f0d84b-4d00-0000-fa22-3ce6a4030000 pid=932->guuid=1239a916-5200-0000-fa22-3ce6c8030000 pid=968 clone guuid=82a4bc16-5200-0000-fa22-3ce6c9030000 pid=969 /usr/bin/rm guuid=17f0d84b-4d00-0000-fa22-3ce6a4030000 pid=932->guuid=82a4bc16-5200-0000-fa22-3ce6c9030000 pid=969 execve e3b8f47c-c845-5324-9849-6a90101af0c9 151.242.30.16:80 guuid=d81a3e4c-4d00-0000-fa22-3ce6a5030000 pid=933->e3b8f47c-c845-5324-9849-6a90101af0c9 send: 85B guuid=67a57e15-5100-0000-fa22-3ce6a8030000 pid=936->e3b8f47c-c845-5324-9849-6a90101af0c9 send: 86B guuid=55c53c4e-5100-0000-fa22-3ce6ab030000 pid=939->e3b8f47c-c845-5324-9849-6a90101af0c9 send: 86B guuid=3d94955d-5100-0000-fa22-3ce6ae030000 pid=942->e3b8f47c-c845-5324-9849-6a90101af0c9 send: 86B guuid=8347666f-5100-0000-fa22-3ce6b1030000 pid=945->e3b8f47c-c845-5324-9849-6a90101af0c9 send: 86B guuid=c279eb7f-5100-0000-fa22-3ce6b4030000 pid=948->e3b8f47c-c845-5324-9849-6a90101af0c9 send: 86B guuid=f59cdcc8-5100-0000-fa22-3ce6b7030000 pid=951->e3b8f47c-c845-5324-9849-6a90101af0c9 send: 86B guuid=a80f2ed1-5100-0000-fa22-3ce6ba030000 pid=954->e3b8f47c-c845-5324-9849-6a90101af0c9 send: 85B guuid=1b7705df-5100-0000-fa22-3ce6bd030000 pid=957->e3b8f47c-c845-5324-9849-6a90101af0c9 send: 85B guuid=11b46bec-5100-0000-fa22-3ce6c0030000 pid=960->e3b8f47c-c845-5324-9849-6a90101af0c9 send: 85B guuid=99892ffc-5100-0000-fa22-3ce6c3030000 pid=963->e3b8f47c-c845-5324-9849-6a90101af0c9 send: 85B guuid=899bdf09-5200-0000-fa22-3ce6c6030000 pid=966->e3b8f47c-c845-5324-9849-6a90101af0c9 send: 88B
Threat name:
Linux.Trojan.Vigorf
Status:
Malicious
First seen:
2025-10-05 15:32:55 UTC
File Type:
Text (Shell)
AV detection:
15 of 38 (39.47%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Suspicious use of SetWindowsHookEx
Modifies registry class
Enumerates physical storage devices
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh 38960238b53e624bb0fdbffb2a9f85b7590943e293d64309384f817215d6df26

(this sample)

  
Delivery method
Distributed via web download

Comments