MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 4803efe03f729d3d5bb3cc181f09c85f59b15cf28ba97229f476ae7b03535efe. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 5


Intelligence 5 IOCs YARA File information Comments

SHA256 hash: 4803efe03f729d3d5bb3cc181f09c85f59b15cf28ba97229f476ae7b03535efe
SHA3-384 hash: 669b248467a26642ae6d1c73eb92f7b64b16200fa72c6690fc92c7d6180183c86ffe9e62cefcb4e05cc38df44ceccbbd
SHA1 hash: 1231f9a74f74cf3f14882832a5a8686ba79a2c98
MD5 hash: 920cca359d6153bf70b4c96dbbcfc978
humanhash: oven-rugby-enemy-oregon
File name:dvr.sh
Download: download sample
Signature Mirai
File size:1'432 bytes
First seen:2025-07-22 11:02:56 UTC
Last seen:Never
File type: sh
MIME type:text/x-shellscript
ssdeep 24:boWBGhBh9Mk8QosptV+/I/V7Qt2n292o2+2vc2GSpatkk0:boGGhL8Qo4V+wV72G2FjYcYpat/0
TLSH T19521929AE540EA70B9C950153287DB6FA07A53F40D431C64FC5EB6B4FE8CC78F452A44
Magika shell
Reporter abuse_ch
Tags:sh
URLMalware sample (SHA256 hash)SignatureTags
http://154.205.133.58/skid.arm4c72b3a3e372704eb64e1f0e9ebd021902928fa8c6df47e15a347fa682d48916 Miraielf mirai ua-wget
http://154.205.133.58/skid.arm5495ce809e735ffcdf61aee835d0dc9201ef56aa045252cfa3e7029aac8a0b891 Miraielf mirai ua-wget
http://154.205.133.58/skid.arm7cac1f84aafd6f3b5d144e2bdad81f759d12515d73fac77cb8ac09678f2c28f52 Miraielf mirai ua-wget

Intelligence


File Origin
# of uploads :
1
# of downloads :
80
Origin country :
DE DE
Vendor Threat Intelligence
Status:
terminated
Behavior Graph:
%3 guuid=14aabcbd-1600-0000-1658-da728b0c0000 pid=3211 /usr/bin/sudo guuid=d7e7b7bf-1600-0000-1658-da72910c0000 pid=3217 /tmp/sample.bin guuid=14aabcbd-1600-0000-1658-da728b0c0000 pid=3211->guuid=d7e7b7bf-1600-0000-1658-da72910c0000 pid=3217 execve guuid=f08fa6c5-1600-0000-1658-da72990c0000 pid=3225 /usr/bin/rm guuid=d7e7b7bf-1600-0000-1658-da72910c0000 pid=3217->guuid=f08fa6c5-1600-0000-1658-da72990c0000 pid=3225 execve guuid=c9349ec6-1600-0000-1658-da729a0c0000 pid=3226 /usr/bin/busybox net send-data write-file guuid=d7e7b7bf-1600-0000-1658-da72910c0000 pid=3217->guuid=c9349ec6-1600-0000-1658-da729a0c0000 pid=3226 execve guuid=c16b2dc9-1600-0000-1658-da729c0c0000 pid=3228 /usr/bin/chmod guuid=d7e7b7bf-1600-0000-1658-da72910c0000 pid=3217->guuid=c16b2dc9-1600-0000-1658-da729c0c0000 pid=3228 execve guuid=039090c9-1600-0000-1658-da729d0c0000 pid=3229 /usr/bin/dash guuid=d7e7b7bf-1600-0000-1658-da72910c0000 pid=3217->guuid=039090c9-1600-0000-1658-da729d0c0000 pid=3229 clone guuid=5deb36ca-1600-0000-1658-da72a00c0000 pid=3232 /usr/bin/rm guuid=d7e7b7bf-1600-0000-1658-da72910c0000 pid=3217->guuid=5deb36ca-1600-0000-1658-da72a00c0000 pid=3232 execve guuid=dc2d72ca-1600-0000-1658-da72a20c0000 pid=3234 /usr/bin/busybox net send-data write-file guuid=d7e7b7bf-1600-0000-1658-da72910c0000 pid=3217->guuid=dc2d72ca-1600-0000-1658-da72a20c0000 pid=3234 execve guuid=82d9f6cb-1600-0000-1658-da72a80c0000 pid=3240 /usr/bin/chmod guuid=d7e7b7bf-1600-0000-1658-da72910c0000 pid=3217->guuid=82d9f6cb-1600-0000-1658-da72a80c0000 pid=3240 execve guuid=544d47cc-1600-0000-1658-da72a90c0000 pid=3241 /usr/bin/dash guuid=d7e7b7bf-1600-0000-1658-da72910c0000 pid=3217->guuid=544d47cc-1600-0000-1658-da72a90c0000 pid=3241 clone guuid=d9f2eacc-1600-0000-1658-da72ab0c0000 pid=3243 /usr/bin/rm guuid=d7e7b7bf-1600-0000-1658-da72910c0000 pid=3217->guuid=d9f2eacc-1600-0000-1658-da72ab0c0000 pid=3243 execve guuid=9a2332cd-1600-0000-1658-da72ac0c0000 pid=3244 /usr/bin/busybox net send-data write-file guuid=d7e7b7bf-1600-0000-1658-da72910c0000 pid=3217->guuid=9a2332cd-1600-0000-1658-da72ac0c0000 pid=3244 execve guuid=d4e8cece-1600-0000-1658-da72b20c0000 pid=3250 /usr/bin/chmod guuid=d7e7b7bf-1600-0000-1658-da72910c0000 pid=3217->guuid=d4e8cece-1600-0000-1658-da72b20c0000 pid=3250 execve guuid=4de90acf-1600-0000-1658-da72b40c0000 pid=3252 /usr/bin/dash guuid=d7e7b7bf-1600-0000-1658-da72910c0000 pid=3217->guuid=4de90acf-1600-0000-1658-da72b40c0000 pid=3252 clone guuid=85c8a0cf-1600-0000-1658-da72b60c0000 pid=3254 /usr/bin/busybox guuid=d7e7b7bf-1600-0000-1658-da72910c0000 pid=3217->guuid=85c8a0cf-1600-0000-1658-da72b60c0000 pid=3254 execve guuid=2d69cccf-1600-0000-1658-da72b70c0000 pid=3255 /usr/bin/busybox guuid=d7e7b7bf-1600-0000-1658-da72910c0000 pid=3217->guuid=2d69cccf-1600-0000-1658-da72b70c0000 pid=3255 execve guuid=ba2afacf-1600-0000-1658-da72b90c0000 pid=3257 /usr/bin/busybox guuid=d7e7b7bf-1600-0000-1658-da72910c0000 pid=3217->guuid=ba2afacf-1600-0000-1658-da72b90c0000 pid=3257 execve guuid=c90c24d0-1600-0000-1658-da72ba0c0000 pid=3258 /usr/bin/busybox guuid=d7e7b7bf-1600-0000-1658-da72910c0000 pid=3217->guuid=c90c24d0-1600-0000-1658-da72ba0c0000 pid=3258 execve guuid=872762d0-1600-0000-1658-da72bb0c0000 pid=3259 /usr/bin/busybox guuid=d7e7b7bf-1600-0000-1658-da72910c0000 pid=3217->guuid=872762d0-1600-0000-1658-da72bb0c0000 pid=3259 execve guuid=fa2da8d0-1600-0000-1658-da72bc0c0000 pid=3260 /usr/bin/busybox guuid=d7e7b7bf-1600-0000-1658-da72910c0000 pid=3217->guuid=fa2da8d0-1600-0000-1658-da72bc0c0000 pid=3260 execve guuid=e3a6edd0-1600-0000-1658-da72bd0c0000 pid=3261 /usr/bin/busybox guuid=d7e7b7bf-1600-0000-1658-da72910c0000 pid=3217->guuid=e3a6edd0-1600-0000-1658-da72bd0c0000 pid=3261 execve a6b092b1-7e1c-56ee-bf44-eccdde92b493 154.205.133.58:80 guuid=c9349ec6-1600-0000-1658-da729a0c0000 pid=3226->a6b092b1-7e1c-56ee-bf44-eccdde92b493 send: 85B guuid=dc2d72ca-1600-0000-1658-da72a20c0000 pid=3234->a6b092b1-7e1c-56ee-bf44-eccdde92b493 send: 86B guuid=9a2332cd-1600-0000-1658-da72ac0c0000 pid=3244->a6b092b1-7e1c-56ee-bf44-eccdde92b493 send: 86B
Verdict:
Malicious
Threat:
HEUR:Trojan-Downloader.Shell.Agent
Threat name:
Linux.Downloader.SAgnt
Status:
Malicious
First seen:
2025-07-22 11:03:21 UTC
File Type:
Text (Shell)
AV detection:
10 of 22 (45.45%)
Threat level:
  3/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
credential_access defense_evasion discovery linux
Behaviour
Reads runtime system information
Writes file to tmp directory
Changes its process name
Reads process memory
Enumerates running processes
File and Directory Permissions Modification
Executes dropped EXE
Renames itself
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh 4803efe03f729d3d5bb3cc181f09c85f59b15cf28ba97229f476ae7b03535efe

(this sample)

  
Delivery method
Distributed via web download

Comments