MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 38b364af710caf0396f2ed1dfbf87da760b53ce22d6b87c741048e4514e21fc7. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 7


Intelligence 7 IOCs YARA 1 File information Comments

SHA256 hash: 38b364af710caf0396f2ed1dfbf87da760b53ce22d6b87c741048e4514e21fc7
SHA3-384 hash: 6c851a05a9d64549b4ee2bf95f56b6d7a2f4d2074bca82c2ebe4eb5e92684f36bb965865b9cec6dd5d0c8dcc19949523
SHA1 hash: 456df6448b70958caad453f4a48c40008ae39a76
MD5 hash: 51af1107fbaa27dfad1730338521977e
humanhash: monkey-fourteen-august-nuts
File name:zeros6x.sh
Download: download sample
Signature Mirai
File size:2'027 bytes
First seen:2025-04-24 09:04:31 UTC
Last seen:2025-04-27 11:28:14 UTC
File type: sh
MIME type:text/x-shellscript
ssdeep 48:v2K1K92KEKh2KLDKL52KBK12KyKJ2K9KN2KEK52KYKL2KPKt2K8KC:v2sU2D42kk2UU2No2C02TI2hW2AE215
TLSH T1DE41C4DA40808BB03EAB9C3BE5A6418A72C262C144D34F827ACDBCF4455ED24E985AC2
Magika shell
Reporter abuse_ch
Tags:mirai sh
URLMalware sample (SHA256 hash)SignatureTags
http://194.110.247.90/fullosc_x86f52346fd61791ca4186ed6b5ae7325af69cc4d9da949559d830410607d4e6282 Miraielf mirai
http://194.110.247.90/fullosc_mips974736d5ff0ec5801a4d286e36c1fa39f346f98e1c2f6eceba6be4c0914259fe Miraielf mirai
http://194.110.247.90/fullosc_mpsl939b262c2619af514e846ab983d099b2b0a9a5f56d502410fce101cf3083dff4 Miraielf mirai
http://194.110.247.90/fullosc_arm0e5f6a92e4f4d7e3fb2a64139de5da4c3c943e8ba231446c73ad5d95cfe48695 Miraielf mirai
http://194.110.247.90/fullosc_arm50716509d74f7914306ab4c60e778d75a3c98acd9a710fcc4333fec9a3d8afcf1 Miraielf mirai
http://194.110.247.90/fullosc_arm6cc58bb17a131428c5802cd9b695f70731a1e5393a251a53e75a7392227d7c348 Miraielf mirai
http://194.110.247.90/fullosc_arm71d52fb249e38c275507e3d3ddae076176dd1fd4544ba2246f87846741a11d5a6 Miraielf mirai
http://194.110.247.90/fullosc_ppc41efd9c9a4516d3332b1ca6454e70a890b70f61768d8d777639cf3239948599a Miraielf mirai
http://194.110.247.90/fullosc_m68kf01afacb5219bc0c4888bf1d888a92765d3747a0682f36b86a45c960ebf37cc4 Miraielf mirai
http://194.110.247.90/fullosc_sh487a5b26aa52028507dcd870547f580ee69cff9fb35fd2eb8f081ff34a46e51d1 Miraielf mirai

Intelligence


File Origin
# of uploads :
2
# of downloads :
109
Origin country :
DE DE
Vendor Threat Intelligence
Verdict:
Malicious
Score:
99.1%
Tags:
trojandownloader agent virus
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
bash evasive lolbin mirai remote
Threat name:
Linux.Downloader.Morila
Status:
Malicious
First seen:
2025-04-24 09:05:23 UTC
File Type:
Text (Shell)
AV detection:
16 of 24 (66.67%)
Threat level:
  3/5
Result
Malware family:
Score:
  10/10
Tags:
family:mirai antivm botnet defense_evasion discovery linux
Behaviour
Reads runtime system information
System Network Configuration Discovery
Writes file to tmp directory
Changes its process name
Checks CPU configuration
File and Directory Permissions Modification
Deletes itself
Executes dropped EXE
Traces itself
Mirai
Mirai family
Malware Config
C2 Extraction:
lorda.hopto.org
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:ach_202412_suspect_bash_script
Author:abuse.ch
Description:Detects suspicious Linux bash scripts

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh 38b364af710caf0396f2ed1dfbf87da760b53ce22d6b87c741048e4514e21fc7

(this sample)

  
Delivery method
Distributed via web download

Comments