MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 47bc5da487763e1dda76e46bbd2d084c0d729623067f23c40357005f13f25c4c. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 7


Intelligence 7 IOCs YARA 2 File information Comments

SHA256 hash: 47bc5da487763e1dda76e46bbd2d084c0d729623067f23c40357005f13f25c4c
SHA3-384 hash: a03839431fc38ad5c79a601098f360162a99988c1d53acd6a59b9d8dd08e7223256de904671f042831934dd1085369c3
SHA1 hash: 66b6ac792e7c3c47d5f029972a10eb1027f040e6
MD5 hash: 93136d831da128c4544a0ef4dee5ff34
humanhash: spaghetti-winter-glucose-wyoming
File name:wget.sh
Download: download sample
Signature Mirai
File size:1'141 bytes
First seen:2026-02-13 08:49:07 UTC
Last seen:Never
File type: sh
MIME type:text/plain
ssdeep 12:KF+2rzfD+Kkrzq5x7KpKy+rBUqlxM+r6UMt2rTzpOrQC7KC+rJxnoRre8s12rYtA:c+mfD+4f7KpoUpnUSGzfC7Ax186/Ng
TLSH T1B121DBC7C351163144409A437347C4BCEA659BCD29C78FBD6C4D0979B6E8D41B550F86
Magika batch
Reporter abuse_ch
Tags:sh
URLMalware sample (SHA256 hash)SignatureTags
http://45.134.38.7/.Sx86_6440ec178e7306a4dfa4502a2b865829a0c58605bac0cbf520761b1e22bc5f5c97 Miraicensys elf mirai ua-wget
http://45.134.38.7/.Smpsln/an/acensys elf ua-wget
http://45.134.38.7/.Smipsn/an/acensys elf ua-wget
http://45.134.38.7/.Sarm4n/an/acensys elf ua-wget
http://45.134.38.7/.Sarm5n/an/acensys elf ua-wget
http://45.134.38.7/.Sarm6n/an/acensys elf ua-wget
http://45.134.38.7/.Sarm7n/an/acensys elf ua-wget
http://45.134.38.7/.Sm68kn/an/acensys elf ua-wget
http://45.134.38.7/.Sx8640ec178e7306a4dfa4502a2b865829a0c58605bac0cbf520761b1e22bc5f5c97 Miraicensys elf mirai ua-wget
http://45.134.38.7/.Sspcn/an/acensys elf ua-wget
http://45.134.38.7/.Sppcn/an/acensys elf ua-wget

Intelligence


File Origin
# of uploads :
1
# of downloads :
36
Origin country :
DE DE
Vendor Threat Intelligence
No detections
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
bash busybox evasive lolbin mirai
Verdict:
Malicious
File Type:
text
First seen:
2026-02-13T05:57:00Z UTC
Last seen:
2026-02-13T14:26:00Z UTC
Hits:
~10
Detections:
HEUR:Trojan-Downloader.Shell.Agent.p HEUR:Trojan-Downloader.Shell.Agent.a
Status:
terminated
Behavior Graph:
%3 guuid=38992dd1-1a00-0000-48fe-d6d2dd0b0000 pid=3037 /usr/bin/sudo guuid=ff2bffd2-1a00-0000-48fe-d6d2e30b0000 pid=3043 /tmp/sample.bin guuid=38992dd1-1a00-0000-48fe-d6d2dd0b0000 pid=3037->guuid=ff2bffd2-1a00-0000-48fe-d6d2e30b0000 pid=3043 execve guuid=b54b32d3-1a00-0000-48fe-d6d2e50b0000 pid=3045 /usr/bin/rm guuid=ff2bffd2-1a00-0000-48fe-d6d2e30b0000 pid=3043->guuid=b54b32d3-1a00-0000-48fe-d6d2e50b0000 pid=3045 execve guuid=d54fe2d3-1a00-0000-48fe-d6d2e80b0000 pid=3048 /usr/bin/busybox net send-data write-file guuid=ff2bffd2-1a00-0000-48fe-d6d2e30b0000 pid=3043->guuid=d54fe2d3-1a00-0000-48fe-d6d2e80b0000 pid=3048 execve guuid=def88dda-1a00-0000-48fe-d6d2fd0b0000 pid=3069 /usr/bin/chmod guuid=ff2bffd2-1a00-0000-48fe-d6d2e30b0000 pid=3043->guuid=def88dda-1a00-0000-48fe-d6d2fd0b0000 pid=3069 execve guuid=2fe6c8da-1a00-0000-48fe-d6d2ff0b0000 pid=3071 /tmp/.Sx86_64 delete-file net guuid=ff2bffd2-1a00-0000-48fe-d6d2e30b0000 pid=3043->guuid=2fe6c8da-1a00-0000-48fe-d6d2ff0b0000 pid=3071 execve guuid=1e9800db-1a00-0000-48fe-d6d2020c0000 pid=3074 /usr/bin/rm guuid=ff2bffd2-1a00-0000-48fe-d6d2e30b0000 pid=3043->guuid=1e9800db-1a00-0000-48fe-d6d2020c0000 pid=3074 execve guuid=d98659db-1a00-0000-48fe-d6d2060c0000 pid=3078 /usr/bin/busybox net send-data guuid=ff2bffd2-1a00-0000-48fe-d6d2e30b0000 pid=3043->guuid=d98659db-1a00-0000-48fe-d6d2060c0000 pid=3078 execve guuid=11d446dd-1a00-0000-48fe-d6d20d0c0000 pid=3085 /usr/bin/chmod guuid=ff2bffd2-1a00-0000-48fe-d6d2e30b0000 pid=3043->guuid=11d446dd-1a00-0000-48fe-d6d20d0c0000 pid=3085 execve guuid=464bb3dd-1a00-0000-48fe-d6d20e0c0000 pid=3086 /usr/bin/dash guuid=ff2bffd2-1a00-0000-48fe-d6d2e30b0000 pid=3043->guuid=464bb3dd-1a00-0000-48fe-d6d20e0c0000 pid=3086 clone guuid=e799bedd-1a00-0000-48fe-d6d20f0c0000 pid=3087 /usr/bin/rm guuid=ff2bffd2-1a00-0000-48fe-d6d2e30b0000 pid=3043->guuid=e799bedd-1a00-0000-48fe-d6d20f0c0000 pid=3087 execve guuid=54aa12de-1a00-0000-48fe-d6d2110c0000 pid=3089 /usr/bin/busybox net send-data guuid=ff2bffd2-1a00-0000-48fe-d6d2e30b0000 pid=3043->guuid=54aa12de-1a00-0000-48fe-d6d2110c0000 pid=3089 execve guuid=700b24e0-1a00-0000-48fe-d6d2170c0000 pid=3095 /usr/bin/chmod guuid=ff2bffd2-1a00-0000-48fe-d6d2e30b0000 pid=3043->guuid=700b24e0-1a00-0000-48fe-d6d2170c0000 pid=3095 execve guuid=88926de0-1a00-0000-48fe-d6d2180c0000 pid=3096 /usr/bin/dash guuid=ff2bffd2-1a00-0000-48fe-d6d2e30b0000 pid=3043->guuid=88926de0-1a00-0000-48fe-d6d2180c0000 pid=3096 clone guuid=e5c575e0-1a00-0000-48fe-d6d2190c0000 pid=3097 /usr/bin/rm guuid=ff2bffd2-1a00-0000-48fe-d6d2e30b0000 pid=3043->guuid=e5c575e0-1a00-0000-48fe-d6d2190c0000 pid=3097 execve guuid=ad0cbfe0-1a00-0000-48fe-d6d21b0c0000 pid=3099 /usr/bin/busybox net send-data guuid=ff2bffd2-1a00-0000-48fe-d6d2e30b0000 pid=3043->guuid=ad0cbfe0-1a00-0000-48fe-d6d21b0c0000 pid=3099 execve guuid=fbdbdfe2-1a00-0000-48fe-d6d2210c0000 pid=3105 /usr/bin/chmod guuid=ff2bffd2-1a00-0000-48fe-d6d2e30b0000 pid=3043->guuid=fbdbdfe2-1a00-0000-48fe-d6d2210c0000 pid=3105 execve guuid=f4836de3-1a00-0000-48fe-d6d2230c0000 pid=3107 /usr/bin/dash guuid=ff2bffd2-1a00-0000-48fe-d6d2e30b0000 pid=3043->guuid=f4836de3-1a00-0000-48fe-d6d2230c0000 pid=3107 clone guuid=06577de3-1a00-0000-48fe-d6d2240c0000 pid=3108 /usr/bin/rm guuid=ff2bffd2-1a00-0000-48fe-d6d2e30b0000 pid=3043->guuid=06577de3-1a00-0000-48fe-d6d2240c0000 pid=3108 execve guuid=f2e4c2e3-1a00-0000-48fe-d6d2250c0000 pid=3109 /usr/bin/busybox net send-data guuid=ff2bffd2-1a00-0000-48fe-d6d2e30b0000 pid=3043->guuid=f2e4c2e3-1a00-0000-48fe-d6d2250c0000 pid=3109 execve guuid=2b1cbee5-1a00-0000-48fe-d6d22c0c0000 pid=3116 /usr/bin/chmod guuid=ff2bffd2-1a00-0000-48fe-d6d2e30b0000 pid=3043->guuid=2b1cbee5-1a00-0000-48fe-d6d22c0c0000 pid=3116 execve guuid=cf4223e6-1a00-0000-48fe-d6d22e0c0000 pid=3118 /usr/bin/dash guuid=ff2bffd2-1a00-0000-48fe-d6d2e30b0000 pid=3043->guuid=cf4223e6-1a00-0000-48fe-d6d22e0c0000 pid=3118 clone guuid=e90e30e6-1a00-0000-48fe-d6d22f0c0000 pid=3119 /usr/bin/rm guuid=ff2bffd2-1a00-0000-48fe-d6d2e30b0000 pid=3043->guuid=e90e30e6-1a00-0000-48fe-d6d22f0c0000 pid=3119 execve guuid=617868e6-1a00-0000-48fe-d6d2310c0000 pid=3121 /usr/bin/busybox net send-data guuid=ff2bffd2-1a00-0000-48fe-d6d2e30b0000 pid=3043->guuid=617868e6-1a00-0000-48fe-d6d2310c0000 pid=3121 execve guuid=e67978e8-1a00-0000-48fe-d6d2370c0000 pid=3127 /usr/bin/chmod guuid=ff2bffd2-1a00-0000-48fe-d6d2e30b0000 pid=3043->guuid=e67978e8-1a00-0000-48fe-d6d2370c0000 pid=3127 execve guuid=2e7cb9e8-1a00-0000-48fe-d6d2380c0000 pid=3128 /usr/bin/dash guuid=ff2bffd2-1a00-0000-48fe-d6d2e30b0000 pid=3043->guuid=2e7cb9e8-1a00-0000-48fe-d6d2380c0000 pid=3128 clone guuid=a4adc8e8-1a00-0000-48fe-d6d2390c0000 pid=3129 /usr/bin/rm guuid=ff2bffd2-1a00-0000-48fe-d6d2e30b0000 pid=3043->guuid=a4adc8e8-1a00-0000-48fe-d6d2390c0000 pid=3129 execve guuid=2f2c3ce9-1a00-0000-48fe-d6d23c0c0000 pid=3132 /usr/bin/busybox net send-data guuid=ff2bffd2-1a00-0000-48fe-d6d2e30b0000 pid=3043->guuid=2f2c3ce9-1a00-0000-48fe-d6d23c0c0000 pid=3132 execve guuid=409156eb-1a00-0000-48fe-d6d2430c0000 pid=3139 /usr/bin/chmod guuid=ff2bffd2-1a00-0000-48fe-d6d2e30b0000 pid=3043->guuid=409156eb-1a00-0000-48fe-d6d2430c0000 pid=3139 execve guuid=c6bb8feb-1a00-0000-48fe-d6d2450c0000 pid=3141 /usr/bin/dash guuid=ff2bffd2-1a00-0000-48fe-d6d2e30b0000 pid=3043->guuid=c6bb8feb-1a00-0000-48fe-d6d2450c0000 pid=3141 clone guuid=718896eb-1a00-0000-48fe-d6d2460c0000 pid=3142 /usr/bin/rm guuid=ff2bffd2-1a00-0000-48fe-d6d2e30b0000 pid=3043->guuid=718896eb-1a00-0000-48fe-d6d2460c0000 pid=3142 execve guuid=4ef5cbeb-1a00-0000-48fe-d6d2480c0000 pid=3144 /usr/bin/busybox net send-data guuid=ff2bffd2-1a00-0000-48fe-d6d2e30b0000 pid=3043->guuid=4ef5cbeb-1a00-0000-48fe-d6d2480c0000 pid=3144 execve guuid=36f8c9ed-1a00-0000-48fe-d6d24c0c0000 pid=3148 /usr/bin/chmod guuid=ff2bffd2-1a00-0000-48fe-d6d2e30b0000 pid=3043->guuid=36f8c9ed-1a00-0000-48fe-d6d24c0c0000 pid=3148 execve guuid=310b0bee-1a00-0000-48fe-d6d24e0c0000 pid=3150 /usr/bin/dash guuid=ff2bffd2-1a00-0000-48fe-d6d2e30b0000 pid=3043->guuid=310b0bee-1a00-0000-48fe-d6d24e0c0000 pid=3150 clone guuid=fb091bee-1a00-0000-48fe-d6d24f0c0000 pid=3151 /usr/bin/rm guuid=ff2bffd2-1a00-0000-48fe-d6d2e30b0000 pid=3043->guuid=fb091bee-1a00-0000-48fe-d6d24f0c0000 pid=3151 execve guuid=ba5a54ee-1a00-0000-48fe-d6d2510c0000 pid=3153 /usr/bin/busybox net send-data write-file guuid=ff2bffd2-1a00-0000-48fe-d6d2e30b0000 pid=3043->guuid=ba5a54ee-1a00-0000-48fe-d6d2510c0000 pid=3153 execve guuid=202adff1-1a00-0000-48fe-d6d25a0c0000 pid=3162 /usr/bin/chmod guuid=ff2bffd2-1a00-0000-48fe-d6d2e30b0000 pid=3043->guuid=202adff1-1a00-0000-48fe-d6d25a0c0000 pid=3162 execve guuid=528670f2-1a00-0000-48fe-d6d25c0c0000 pid=3164 /tmp/.Sx86 delete-file net guuid=ff2bffd2-1a00-0000-48fe-d6d2e30b0000 pid=3043->guuid=528670f2-1a00-0000-48fe-d6d25c0c0000 pid=3164 execve guuid=8a1af45a-1c00-0000-48fe-d6d2b90e0000 pid=3769 /usr/bin/rm guuid=ff2bffd2-1a00-0000-48fe-d6d2e30b0000 pid=3043->guuid=8a1af45a-1c00-0000-48fe-d6d2b90e0000 pid=3769 execve guuid=6a254b5b-1c00-0000-48fe-d6d2bb0e0000 pid=3771 /usr/bin/busybox net send-data guuid=ff2bffd2-1a00-0000-48fe-d6d2e30b0000 pid=3043->guuid=6a254b5b-1c00-0000-48fe-d6d2bb0e0000 pid=3771 execve guuid=9501595d-1c00-0000-48fe-d6d2c40e0000 pid=3780 /usr/bin/chmod guuid=ff2bffd2-1a00-0000-48fe-d6d2e30b0000 pid=3043->guuid=9501595d-1c00-0000-48fe-d6d2c40e0000 pid=3780 execve guuid=de77e35d-1c00-0000-48fe-d6d2c60e0000 pid=3782 /usr/bin/dash guuid=ff2bffd2-1a00-0000-48fe-d6d2e30b0000 pid=3043->guuid=de77e35d-1c00-0000-48fe-d6d2c60e0000 pid=3782 clone guuid=ad90f95d-1c00-0000-48fe-d6d2c90e0000 pid=3785 /usr/bin/rm guuid=ff2bffd2-1a00-0000-48fe-d6d2e30b0000 pid=3043->guuid=ad90f95d-1c00-0000-48fe-d6d2c90e0000 pid=3785 execve guuid=68a7495e-1c00-0000-48fe-d6d2ca0e0000 pid=3786 /usr/bin/busybox net send-data guuid=ff2bffd2-1a00-0000-48fe-d6d2e30b0000 pid=3043->guuid=68a7495e-1c00-0000-48fe-d6d2ca0e0000 pid=3786 execve guuid=88e57d60-1c00-0000-48fe-d6d2d30e0000 pid=3795 /usr/bin/chmod guuid=ff2bffd2-1a00-0000-48fe-d6d2e30b0000 pid=3043->guuid=88e57d60-1c00-0000-48fe-d6d2d30e0000 pid=3795 execve guuid=9b7bed60-1c00-0000-48fe-d6d2d40e0000 pid=3796 /usr/bin/dash guuid=ff2bffd2-1a00-0000-48fe-d6d2e30b0000 pid=3043->guuid=9b7bed60-1c00-0000-48fe-d6d2d40e0000 pid=3796 clone 63cea730-4512-591e-a379-bab89b0004da 45.134.38.7:80 guuid=d54fe2d3-1a00-0000-48fe-d6d2e80b0000 pid=3048->63cea730-4512-591e-a379-bab89b0004da send: 82B 8b0a01dc-0728-52c1-8024-c4ba7801b8d6 8.8.8.8:53 guuid=2fe6c8da-1a00-0000-48fe-d6d2ff0b0000 pid=3071->8b0a01dc-0728-52c1-8024-c4ba7801b8d6 con guuid=5d0af9da-1a00-0000-48fe-d6d2010c0000 pid=3073 /tmp/.Sx86_64 net send-data zombie guuid=2fe6c8da-1a00-0000-48fe-d6d2ff0b0000 pid=3071->guuid=5d0af9da-1a00-0000-48fe-d6d2010c0000 pid=3073 clone guuid=5d0af9da-1a00-0000-48fe-d6d2010c0000 pid=3073->8b0a01dc-0728-52c1-8024-c4ba7801b8d6 send: 42B guuid=ece001db-1a00-0000-48fe-d6d2030c0000 pid=3075 /tmp/.Sx86_64 zombie guuid=5d0af9da-1a00-0000-48fe-d6d2010c0000 pid=3073->guuid=ece001db-1a00-0000-48fe-d6d2030c0000 pid=3075 clone guuid=61c706db-1a00-0000-48fe-d6d2040c0000 pid=3076 /tmp/.Sx86_64 net zombie guuid=5d0af9da-1a00-0000-48fe-d6d2010c0000 pid=3073->guuid=61c706db-1a00-0000-48fe-d6d2040c0000 pid=3076 clone 013beaa1-48f4-52ce-b9df-0b84be7b45dc 147.28.134.21:199 guuid=61c706db-1a00-0000-48fe-d6d2040c0000 pid=3076->013beaa1-48f4-52ce-b9df-0b84be7b45dc con guuid=d98659db-1a00-0000-48fe-d6d2060c0000 pid=3078->63cea730-4512-591e-a379-bab89b0004da send: 80B guuid=54aa12de-1a00-0000-48fe-d6d2110c0000 pid=3089->63cea730-4512-591e-a379-bab89b0004da send: 80B guuid=ad0cbfe0-1a00-0000-48fe-d6d21b0c0000 pid=3099->63cea730-4512-591e-a379-bab89b0004da send: 80B guuid=f2e4c2e3-1a00-0000-48fe-d6d2250c0000 pid=3109->63cea730-4512-591e-a379-bab89b0004da send: 80B guuid=617868e6-1a00-0000-48fe-d6d2310c0000 pid=3121->63cea730-4512-591e-a379-bab89b0004da send: 80B guuid=2f2c3ce9-1a00-0000-48fe-d6d23c0c0000 pid=3132->63cea730-4512-591e-a379-bab89b0004da send: 80B guuid=4ef5cbeb-1a00-0000-48fe-d6d2480c0000 pid=3144->63cea730-4512-591e-a379-bab89b0004da send: 80B guuid=ba5a54ee-1a00-0000-48fe-d6d2510c0000 pid=3153->63cea730-4512-591e-a379-bab89b0004da send: 79B guuid=528670f2-1a00-0000-48fe-d6d25c0c0000 pid=3164->8b0a01dc-0728-52c1-8024-c4ba7801b8d6 con 0637bfa0-18a1-551d-95eb-ed76e272eef1 0.0.0.0:18129 guuid=528670f2-1a00-0000-48fe-d6d25c0c0000 pid=3164->0637bfa0-18a1-551d-95eb-ed76e272eef1 con guuid=9cdfdb5a-1c00-0000-48fe-d6d2b70e0000 pid=3767 /tmp/.Sx86 net send-data zombie guuid=528670f2-1a00-0000-48fe-d6d25c0c0000 pid=3164->guuid=9cdfdb5a-1c00-0000-48fe-d6d2b70e0000 pid=3767 clone guuid=9cdfdb5a-1c00-0000-48fe-d6d2b70e0000 pid=3767->8b0a01dc-0728-52c1-8024-c4ba7801b8d6 send: 42B guuid=9de6f15a-1c00-0000-48fe-d6d2b80e0000 pid=3768 /tmp/.Sx86 guuid=9cdfdb5a-1c00-0000-48fe-d6d2b70e0000 pid=3767->guuid=9de6f15a-1c00-0000-48fe-d6d2b80e0000 pid=3768 clone guuid=5e52f95a-1c00-0000-48fe-d6d2ba0e0000 pid=3770 /tmp/.Sx86 guuid=9cdfdb5a-1c00-0000-48fe-d6d2b70e0000 pid=3767->guuid=5e52f95a-1c00-0000-48fe-d6d2ba0e0000 pid=3770 clone guuid=6a254b5b-1c00-0000-48fe-d6d2bb0e0000 pid=3771->63cea730-4512-591e-a379-bab89b0004da send: 79B guuid=68a7495e-1c00-0000-48fe-d6d2ca0e0000 pid=3786->63cea730-4512-591e-a379-bab89b0004da send: 79B
Verdict:
Malicious
Threat:
Trojan-Downloader.Shell.Agent
Threat name:
Linux.Downloader.Generic
Status:
Suspicious
First seen:
2026-02-13 08:50:44 UTC
File Type:
Text (Shell)
AV detection:
14 of 36 (38.89%)
Threat level:
  3/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Modifies registry class
Suspicious use of SetWindowsHookEx
Enumerates physical storage devices
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:ach_202412_suspect_bash_script
Author:abuse.ch
Description:Detects suspicious Linux bash scripts
Rule name:MAL_Linux_IoT_MultiArch_BotnetLoader_Generic
Author:Anish Bogati
Description:Technique-based detection of IoT/Linux botnet loader shell scripts downloading binaries from numeric IPs, chmodding, and executing multi-architecture payloads
Reference:MalwareBazaar sample lilin.sh

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh 47bc5da487763e1dda76e46bbd2d084c0d729623067f23c40357005f13f25c4c

(this sample)

  
Delivery method
Distributed via web download

Comments