MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 39e74d6cbe1da1a800ef0abcf9c7d9177a9982d58898356c73c0a74c833fce02. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 5


Intelligence 5 IOCs YARA File information Comments

SHA256 hash: 39e74d6cbe1da1a800ef0abcf9c7d9177a9982d58898356c73c0a74c833fce02
SHA3-384 hash: 142736ed4294a3b7ed0a416b24948088170f5a7fb07fc7eaaec70bf17961b9c28a972d5dfbad2fd1f29e1e7ddcb62366
SHA1 hash: 22ae42cf126a4a4db76e928ac088ea1a6b99bcca
MD5 hash: 7fadf66302a6fc10d74feaa7c6267a7c
humanhash: golf-oven-yellow-cola
File name:dvr.sh
Download: download sample
Signature Mirai
File size:340 bytes
First seen:2025-07-03 11:50:53 UTC
Last seen:Never
File type: sh
MIME type:text/x-shellscript
ssdeep 6:htI1RDjbWUtISpp8CFwVbWUtIS3F/F2X/I/PN73gF0bWUtIS1FSML:bIbXP9pLwVPDX+/I/PN73A0PzSm
TLSH T16AE048D6E855DED65857141C21D7C51CF0EAC3F416C6878C7C5E0935C9C864CF46358C
Magika shell
Reporter abuse_ch
Tags:sh
URLMalware sample (SHA256 hash)SignatureTags
http://154.205.133.58/lol.arm020b87fdaa06a1609bdc0c9bb9c5441241a1ac29ea656f087c19a385e5177766 Miraielf mirai ua-wget
http://154.205.133.58/lol.arm536796d056ca6b55227eccf5ef5d1bf83ba4b1b516013f98408210c9229169cc5 Miraielf mirai ua-wget
http://154.205.133.58/lol.arm79c765ec2b4b7ac6f218873fd11916bc996b7f6f443731885bba1108374214eb9 Miraielf mirai ua-wget

Intelligence


File Origin
# of uploads :
1
# of downloads :
19
Origin country :
DE DE
Vendor Threat Intelligence
Status:
terminated
Behavior Graph:
%3 guuid=46bfb92e-1a00-0000-60d8-b7b18d090000 pid=2445 /usr/bin/sudo guuid=12f59030-1a00-0000-60d8-b7b195090000 pid=2453 /tmp/sample.bin guuid=46bfb92e-1a00-0000-60d8-b7b18d090000 pid=2445->guuid=12f59030-1a00-0000-60d8-b7b195090000 pid=2453 execve guuid=f212c830-1a00-0000-60d8-b7b196090000 pid=2454 /usr/bin/rm guuid=12f59030-1a00-0000-60d8-b7b195090000 pid=2453->guuid=f212c830-1a00-0000-60d8-b7b196090000 pid=2454 execve guuid=ae8a3131-1a00-0000-60d8-b7b198090000 pid=2456 /usr/bin/wget net send-data guuid=12f59030-1a00-0000-60d8-b7b195090000 pid=2453->guuid=ae8a3131-1a00-0000-60d8-b7b198090000 pid=2456 execve guuid=c68ebf35-1a00-0000-60d8-b7b1a4090000 pid=2468 /usr/bin/chmod guuid=12f59030-1a00-0000-60d8-b7b195090000 pid=2453->guuid=c68ebf35-1a00-0000-60d8-b7b1a4090000 pid=2468 execve guuid=40462536-1a00-0000-60d8-b7b1a6090000 pid=2470 /tmp/adferqtg guuid=12f59030-1a00-0000-60d8-b7b195090000 pid=2453->guuid=40462536-1a00-0000-60d8-b7b1a6090000 pid=2470 execve guuid=9e1e2637-1a00-0000-60d8-b7b1ac090000 pid=2476 /usr/bin/rm guuid=12f59030-1a00-0000-60d8-b7b195090000 pid=2453->guuid=9e1e2637-1a00-0000-60d8-b7b1ac090000 pid=2476 execve guuid=c4f17a37-1a00-0000-60d8-b7b1ad090000 pid=2477 /usr/bin/wget net send-data guuid=12f59030-1a00-0000-60d8-b7b195090000 pid=2453->guuid=c4f17a37-1a00-0000-60d8-b7b1ad090000 pid=2477 execve guuid=c22f5439-1a00-0000-60d8-b7b1b2090000 pid=2482 /usr/bin/chmod guuid=12f59030-1a00-0000-60d8-b7b195090000 pid=2453->guuid=c22f5439-1a00-0000-60d8-b7b1b2090000 pid=2482 execve guuid=7cddb439-1a00-0000-60d8-b7b1b4090000 pid=2484 /tmp/asdfvacb guuid=12f59030-1a00-0000-60d8-b7b195090000 pid=2453->guuid=7cddb439-1a00-0000-60d8-b7b1b4090000 pid=2484 execve guuid=33f5923a-1a00-0000-60d8-b7b1b8090000 pid=2488 /usr/bin/rm guuid=12f59030-1a00-0000-60d8-b7b195090000 pid=2453->guuid=33f5923a-1a00-0000-60d8-b7b1b8090000 pid=2488 execve guuid=6821dc3a-1a00-0000-60d8-b7b1ba090000 pid=2490 /usr/bin/wget net send-data guuid=12f59030-1a00-0000-60d8-b7b195090000 pid=2453->guuid=6821dc3a-1a00-0000-60d8-b7b1ba090000 pid=2490 execve guuid=c4e85c3e-1a00-0000-60d8-b7b1c0090000 pid=2496 /usr/bin/chmod guuid=12f59030-1a00-0000-60d8-b7b195090000 pid=2453->guuid=c4e85c3e-1a00-0000-60d8-b7b1c0090000 pid=2496 execve guuid=a4b8cf3e-1a00-0000-60d8-b7b1c2090000 pid=2498 /tmp/wrtuikdb guuid=12f59030-1a00-0000-60d8-b7b195090000 pid=2453->guuid=a4b8cf3e-1a00-0000-60d8-b7b1c2090000 pid=2498 execve a6b092b1-7e1c-56ee-bf44-eccdde92b493 154.205.133.58:80 guuid=ae8a3131-1a00-0000-60d8-b7b198090000 pid=2456->a6b092b1-7e1c-56ee-bf44-eccdde92b493 send: 136B guuid=c4f17a37-1a00-0000-60d8-b7b1ad090000 pid=2477->a6b092b1-7e1c-56ee-bf44-eccdde92b493 send: 137B guuid=6821dc3a-1a00-0000-60d8-b7b1ba090000 pid=2490->a6b092b1-7e1c-56ee-bf44-eccdde92b493 send: 137B
Threat name:
Document-HTML.Trojan.Vigorf
Status:
Malicious
First seen:
2025-07-03 11:37:25 UTC
File Type:
Text (Shell)
AV detection:
10 of 24 (41.67%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
defense_evasion linux
Behaviour
Writes file to tmp directory
File and Directory Permissions Modification
Executes dropped EXE
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh 39e74d6cbe1da1a800ef0abcf9c7d9177a9982d58898356c73c0a74c833fce02

(this sample)

  
Delivery method
Distributed via web download

Comments