MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 3bf71df19c91091b29d73a25e61ad421d51e13f1926c222b7b37f26e02c5c68d. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 7


Intelligence 7 IOCs YARA 2 File information Comments

SHA256 hash: 3bf71df19c91091b29d73a25e61ad421d51e13f1926c222b7b37f26e02c5c68d
SHA3-384 hash: 235f76edf661687f7faa0804823f1a864e0a5874ff882774e066902df73c36e7845ebe159604cfb256548636c25b25b1
SHA1 hash: 5f39f577b5561a7a489734f7960ec462bafd3b96
MD5 hash: 6afe59ca9594d1189b537ff009ba649c
humanhash: enemy-uranus-thirteen-helium
File name:nigger.sh
Download: download sample
Signature Mirai
File size:1'602 bytes
First seen:2026-01-12 02:27:30 UTC
Last seen:Never
File type: sh
MIME type:text/plain
ssdeep 24:A5Xf+h+NhJWd5Xf+w+o1jJQpr5rta8Y/TiTCrjTdzTdtz8PSAAAiGOWsDxeG5GcE:AVThJWdVjNJOyrNjAiGOWy48Tk78GQn2
TLSH T1F231C7CF063F39154EC7CF1B73E107CA5189A3E1E097DBF59808192668C5888749CEE9
Magika shell
Reporter abuse_ch
Tags:sh
URLMalware sample (SHA256 hash)SignatureTags
http://91.92.241.10/x86_64.kok78e260a5118578e0b4d1a55374c217c218c48ab8f7455dd5a28a70746f99f715 Miraielf geofenced mirai ua-wget USA x86
http://91.92.241.10/x86_32.kok03d7a243a18f053113e199837d74324b063c744679e681dde068d129d109af9f Miraielf geofenced mirai ua-wget USA x86
http://91.92.241.10/powerpc.kok7570d065c824764a1a3a6c65496685bfc83eff811cc1345ccb7273141950cb46 Miraielf geofenced mirai PowerPC ua-wget USA
http://91.92.241.10/mips.kokdf84c58145c759e99c74fed1570dbf9089dfb200669fb911f4d60f307ef63648 Miraielf geofenced mips mirai ua-wget USA
http://91.92.241.10/mipsel.kokd8409d9322d329c981e3ebaa0f02336bcfd122f93210ad1aa627a125196d5a57 Miraielf geofenced mips mirai ua-wget USA
http://91.92.241.10/arm.kokf762c3e51a32e4e93fd41fe3be4eac71606d84cc1372f5e100bff5b35241e74f Miraiarm elf geofenced mirai ua-wget USA
http://91.92.241.10/arm5.kokff4abf773e3047ea1a94dbb4d2a7032a9dccc7a396cad04511d991c66dc37448 Miraiarm elf geofenced mirai ua-wget USA
http://91.92.241.10/arm6.kok6ae6ed76ac1b59475676b279f542a724967a0a91c61aa76cb9e2d307b1e26fa7 Miraiarm elf geofenced mirai ua-wget USA
http://91.92.241.10/arm7.kok32a28b0a2b16b3f4d89f1931ee19a6726c967b9da88e8da04548dd90b900e1cd Miraiarm elf geofenced mirai ua-wget USA
http://91.92.241.10/sparc.kokn/an/aelf ua-wget
http://91.92.241.10/m68k.kokn/an/aelf ua-wget
http://91.92.241.10/sh4.kokn/an/aelf ua-wget

Intelligence


File Origin
# of uploads :
1
# of downloads :
66
Origin country :
DE DE
Vendor Threat Intelligence
No detections
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
evasive mirai
Verdict:
Malicious
File Type:
text
First seen:
2026-01-11T22:37:00Z UTC
Last seen:
2026-01-11T23:44:00Z UTC
Hits:
~10
Detections:
HEUR:Trojan-Downloader.Shell.Agent.a
Verdict:
Malicious
Threat:
Trojan-Downloader.Shell.Agent
Threat name:
Script-Shell.Worm.Mirai
Status:
Malicious
First seen:
2026-01-12 02:28:26 UTC
File Type:
Text (Shell)
AV detection:
9 of 24 (37.50%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Modifies registry class
Suspicious use of SetWindowsHookEx
Enumerates physical storage devices
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:ach_202412_suspect_bash_script
Author:abuse.ch
Description:Detects suspicious Linux bash scripts
Rule name:MAL_Linux_IoT_MultiArch_BotnetLoader_Generic
Author:Anish Bogati
Description:Technique-based detection of IoT/Linux botnet loader shell scripts downloading binaries from numeric IPs, chmodding, and executing multi-architecture payloads
Reference:MalwareBazaar sample lilin.sh

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh 3bf71df19c91091b29d73a25e61ad421d51e13f1926c222b7b37f26e02c5c68d

(this sample)

  
Delivery method
Distributed via web download

Comments