MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 38f1d87bf24013ce3ec1049b758b5ee54a49eba35a5cb0057f559b9290028300. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 7


Intelligence 7 IOCs YARA 1 File information Comments

SHA256 hash: 38f1d87bf24013ce3ec1049b758b5ee54a49eba35a5cb0057f559b9290028300
SHA3-384 hash: 8bb5177b186e014c3dc89a14f4899dd0b3b37a66fcb45eba502f60783d5755b586b97e5694046754987a5dfccd47d034
SHA1 hash: 34833e7ebcb2639d7e5544a9fa394edb26c8bb13
MD5 hash: c885b8f159c202023f6efdcd37e2de91
humanhash: angel-charlie-wisconsin-delta
File name:xwget.sh
Download: download sample
Signature Mirai
File size:2'617 bytes
First seen:2025-08-08 17:29:26 UTC
Last seen:Never
File type: sh
MIME type:text/x-shellscript
ssdeep 48:VPWyGjqspu/Rq1ClA9AYrjtE1xH7/LuZi1qP6oYDJ521+lly33zbdlRB4E81v:V0jA/c195E1xb6s1qP6ocz21+lly3DbM
TLSH T1EA51BADE45252C4EF2199B4B73BB8C0921768FB9109FCF8D9FC5392A9D4CA24B093E51
Magika shell
Reporter abuse_ch
Tags:mirai sh
URLMalware sample (SHA256 hash)SignatureTags
http://213.209.150.187/odin.arm9a36946cbdf2682af5b0227ee93b120c3c0543f260076bb2094638a71b68e294 Miraielf geofenced mirai ua-wget USA
http://213.209.150.187/odin.arm5nd89b9aa7f0ac337077c5614d1d8321d1a0dff5280560bde0a8339c0dba0abd5d Miraielf geofenced mirai ua-wget USA
http://213.209.150.187/odin.arm7bdde0035d6b37dce2fff359848916a559640206659024577d4fa61608b4931bc Miraielf geofenced mirai ua-wget USA
http://213.209.150.187/odin.m68ka11b9aef373169010a4822273a8a16fb4deb9e386166e4b94aa791f34a25f39e Miraielf geofenced mirai ua-wget USA
http://213.209.150.187/odin.mipsa25ff39e978fa88f79d10bcd25a86bc48d196af8e2046be47a886ce4dd6a6650 Miraielf geofenced mirai ua-wget USA
http://213.209.150.187/odin.mpsl96f1e58ca140b8babe3873412dc17b203d2b87df2e70886625c249d3db092789 Miraielf geofenced mirai ua-wget USA
http://213.209.150.187/odin.ppce7834d6e7af525e9200c4f98255f6a3db500d86e1a1d254610c1f5d47a90575b Miraielf geofenced mirai ua-wget USA
http://213.209.150.187/odin.sh4b185e773d0014ff89e12a4ba6075282488a1b130af190e3d8c064d618c11cf7e Miraielf geofenced mirai ua-wget USA
http://213.209.150.187/odin.spc3ccec93311c41cc3a813b5762e249706c4cc3fd2c04894585300e05221268a01 Miraielf geofenced mirai ua-wget USA
http://213.209.150.187/odin.x86aa14c7945115ba63c093f4ca508af7a9b20198c432a70b68cab2f52bad4121c7 Miraielf geofenced mirai ua-wget USA
http://213.209.150.187/bizy.arm5n/an/aelf ua-wget
http://213.209.150.187/bizy.arm6n/an/aelf ua-wget
http://213.209.150.187/bizy.arm7n/an/aelf ua-wget
http://213.209.150.187/bizy.arm8n/an/aelf ua-wget
http://213.209.150.187/bizy.mipsn/an/aelf ua-wget
http://213.209.150.187/bizy.mpsln/an/aelf ua-wget
http://213.209.150.187/bizy.mipssn/an/aelf ua-wget
http://213.209.150.187/bizy.mpslsn/an/aelf ua-wget
http://213.209.150.187/bizy.riscve2fbe4a0085cfa107069c0a614ecae10e3b1b04f1ecfee287f2d5abdc2b79a13 Miraielf mirai ua-wget
http://213.209.150.187/bizy.x86n/an/aelf ua-wget
http://213.209.150.187/bizy.x64n/an/aelf ua-wget
http://213.209.150.187/bizy.mips642fa27985ef9b46d3584dcff9ec777b1fdd62ea98a7660490cc3ebb5fc5b79172 Miraielf mirai ua-wget
http://213.209.150.187/bizy.mpsl648b35595ec94e07930eaf57ce734a1d48ab90db9ee97073bedda788574786eeda Miraielf mirai ua-wget

Intelligence


File Origin
# of uploads :
1
# of downloads :
31
Origin country :
DE DE
Vendor Threat Intelligence
Threat name:
Script-Shell.Trojan.Geninst
Status:
Malicious
First seen:
2025-08-08 17:30:50 UTC
File Type:
Text (Shell)
AV detection:
12 of 24 (50.00%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:mirai botnet defense_evasion discovery linux upx
Behaviour
Enumerates kernel/hardware configuration
Reads runtime system information
System Network Configuration Discovery
Writes file to tmp directory
UPX packed file
File and Directory Permissions Modification
Deletes itself
Executes dropped EXE
Contacts a large (14560) amount of remote hosts
Creates a large amount of network flows
Mirai
Mirai family
Malware Config
C2 Extraction:
104d.hldns.ru
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:ach_202412_suspect_bash_script
Author:abuse.ch
Description:Detects suspicious Linux bash scripts

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh 38f1d87bf24013ce3ec1049b758b5ee54a49eba35a5cb0057f559b9290028300

(this sample)

  
Delivery method
Distributed via web download

Comments