MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 426ac46e2e709cee13d92136890f5ddc0f32a935f222c2daa0d18465c51f3421. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 6


Intelligence 6 IOCs YARA 1 File information Comments

SHA256 hash: 426ac46e2e709cee13d92136890f5ddc0f32a935f222c2daa0d18465c51f3421
SHA3-384 hash: 2dc186cb04267a3cdf3f69b9ddc25402216aa3203a9bc0dbb8f3ae5b5c95df75d6cf6fb9da79de5ee58d14008a087ddc
SHA1 hash: 3cbf87919b05d53f6127ec97110739b51fdb96e5
MD5 hash: 6784acc922750994065bac59a978e9bd
humanhash: pennsylvania-ten-jersey-hotel
File name:faith
Download: download sample
Signature Mirai
File size:709 bytes
First seen:2025-06-26 05:48:35 UTC
Last seen:Never
File type: sh
MIME type:text/plain
ssdeep 12:NLGEULnWKDbnPZw5ZMoOF7+MB05L7pZDx7gDNk8Rj7XCx7XRDNk8R9:sEUSIbK5zOt+MB0h1Z1WkMU7ky
TLSH T1BF01CBCE6162CC308C925DEA79534519F48DD7C536CF8EC8B1CE4132E99CD083092F5A
Magika txt
Reporter abuse_ch
Tags:sh
URLMalware sample (SHA256 hash)SignatureTags
http://158.51.126.131/mipsn/an/aelf gafgyt mirai ua-wget
http://158.51.126.131/mipsel68b7a90ca3d6b4034d4428ee1483178d9a69171090087523ecd8d2314aa60603 Miraielf gafgyt mirai ua-wget

Intelligence


File Origin
# of uploads :
1
# of downloads :
85
Origin country :
DE DE
Vendor Threat Intelligence
Status:
terminated
Behavior Graph:
%3 guuid=0c359c0e-1900-0000-d548-f46216140000 pid=5142 /usr/bin/sudo guuid=73abea10-1900-0000-d548-f4621b140000 pid=5147 /tmp/sample.bin guuid=0c359c0e-1900-0000-d548-f46216140000 pid=5142->guuid=73abea10-1900-0000-d548-f4621b140000 pid=5147 execve guuid=3df25611-1900-0000-d548-f4621d140000 pid=5149 /usr/bin/dash guuid=73abea10-1900-0000-d548-f4621b140000 pid=5147->guuid=3df25611-1900-0000-d548-f4621d140000 pid=5149 clone guuid=24669912-1900-0000-d548-f46225140000 pid=5157 /usr/bin/rm delete-file guuid=73abea10-1900-0000-d548-f4621b140000 pid=5147->guuid=24669912-1900-0000-d548-f46225140000 pid=5157 execve guuid=bdb1ec12-1900-0000-d548-f46228140000 pid=5160 /usr/bin/rm delete-file guuid=73abea10-1900-0000-d548-f4621b140000 pid=5147->guuid=bdb1ec12-1900-0000-d548-f46228140000 pid=5160 execve guuid=b4483b13-1900-0000-d548-f4622a140000 pid=5162 /usr/bin/rm delete-file guuid=73abea10-1900-0000-d548-f4621b140000 pid=5147->guuid=b4483b13-1900-0000-d548-f4622a140000 pid=5162 execve guuid=88e77b13-1900-0000-d548-f4622c140000 pid=5164 /usr/bin/dash guuid=73abea10-1900-0000-d548-f4621b140000 pid=5147->guuid=88e77b13-1900-0000-d548-f4622c140000 pid=5164 clone guuid=ea639114-1900-0000-d548-f46236140000 pid=5174 /usr/bin/dash guuid=73abea10-1900-0000-d548-f4621b140000 pid=5147->guuid=ea639114-1900-0000-d548-f46236140000 pid=5174 clone guuid=94e9d814-1900-0000-d548-f4623a140000 pid=5178 /usr/bin/dash guuid=73abea10-1900-0000-d548-f4621b140000 pid=5147->guuid=94e9d814-1900-0000-d548-f4623a140000 pid=5178 clone guuid=b425663f-1900-0000-d548-f4626c140000 pid=5228 /usr/bin/chmod guuid=73abea10-1900-0000-d548-f4621b140000 pid=5147->guuid=b425663f-1900-0000-d548-f4626c140000 pid=5228 execve guuid=3a79e33f-1900-0000-d548-f4626d140000 pid=5229 /usr/bin/dash guuid=73abea10-1900-0000-d548-f4621b140000 pid=5147->guuid=3a79e33f-1900-0000-d548-f4626d140000 pid=5229 clone guuid=c1858941-1900-0000-d548-f4626f140000 pid=5231 /usr/bin/dash guuid=73abea10-1900-0000-d548-f4621b140000 pid=5147->guuid=c1858941-1900-0000-d548-f4626f140000 pid=5231 clone guuid=17b8356c-1900-0000-d548-f46271140000 pid=5233 /usr/bin/chmod guuid=73abea10-1900-0000-d548-f4621b140000 pid=5147->guuid=17b8356c-1900-0000-d548-f46271140000 pid=5233 execve guuid=b709e06c-1900-0000-d548-f46272140000 pid=5234 /usr/bin/dash guuid=73abea10-1900-0000-d548-f4621b140000 pid=5147->guuid=b709e06c-1900-0000-d548-f46272140000 pid=5234 clone guuid=e4257011-1900-0000-d548-f4621e140000 pid=5150 /usr/bin/cat guuid=3df25611-1900-0000-d548-f4621d140000 pid=5149->guuid=e4257011-1900-0000-d548-f4621e140000 pid=5150 execve guuid=3d148011-1900-0000-d548-f4621f140000 pid=5151 /usr/bin/grep guuid=3df25611-1900-0000-d548-f4621d140000 pid=5149->guuid=3d148011-1900-0000-d548-f4621f140000 pid=5151 execve guuid=d1628e11-1900-0000-d548-f46220140000 pid=5152 /usr/bin/grep guuid=3df25611-1900-0000-d548-f4621d140000 pid=5149->guuid=d1628e11-1900-0000-d548-f46220140000 pid=5152 execve guuid=c2c11212-1900-0000-d548-f46222140000 pid=5154 /usr/bin/grep guuid=3df25611-1900-0000-d548-f4621d140000 pid=5149->guuid=c2c11212-1900-0000-d548-f46222140000 pid=5154 execve guuid=45d41912-1900-0000-d548-f46223140000 pid=5155 /usr/bin/cut guuid=3df25611-1900-0000-d548-f4621d140000 pid=5149->guuid=45d41912-1900-0000-d548-f46223140000 pid=5155 execve guuid=789f8513-1900-0000-d548-f4622d140000 pid=5165 /usr/bin/cp write-file guuid=88e77b13-1900-0000-d548-f4622c140000 pid=5164->guuid=789f8513-1900-0000-d548-f4622d140000 pid=5165 execve guuid=77b89814-1900-0000-d548-f46237140000 pid=5175 /usr/bin/chmod guuid=ea639114-1900-0000-d548-f46236140000 pid=5174->guuid=77b89814-1900-0000-d548-f46237140000 pid=5175 execve guuid=8ac2e214-1900-0000-d548-f4623b140000 pid=5179 /usr/bin/wget net send-data write-file guuid=94e9d814-1900-0000-d548-f4623a140000 pid=5178->guuid=8ac2e214-1900-0000-d548-f4623b140000 pid=5179 execve 2beca644-24da-5e18-bc49-c06b8c4a111d 158.51.126.131:80 guuid=8ac2e214-1900-0000-d548-f4623b140000 pid=5179->2beca644-24da-5e18-bc49-c06b8c4a111d send: 133B guuid=b5079a41-1900-0000-d548-f46270140000 pid=5232 /usr/bin/wget net send-data write-file guuid=c1858941-1900-0000-d548-f4626f140000 pid=5231->guuid=b5079a41-1900-0000-d548-f46270140000 pid=5232 execve guuid=b5079a41-1900-0000-d548-f46270140000 pid=5232->2beca644-24da-5e18-bc49-c06b8c4a111d send: 135B
Threat name:
Linux.Trojan.Generic
Status:
Suspicious
First seen:
2025-06-26 05:52:28 UTC
File Type:
Text (Shell)
AV detection:
8 of 24 (33.33%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Modifies registry class
Suspicious use of SetWindowsHookEx
Enumerates physical storage devices
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:ach_202412_suspect_bash_script
Author:abuse.ch
Description:Detects suspicious Linux bash scripts

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh 426ac46e2e709cee13d92136890f5ddc0f32a935f222c2daa0d18465c51f3421

(this sample)

  
Delivery method
Distributed via web download

Comments