MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 4816c6dc6bb538172c0ad662db48a8787a9e0a258b727f01ca93bfbf70c90e06. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: 4816c6dc6bb538172c0ad662db48a8787a9e0a258b727f01ca93bfbf70c90e06
SHA3-384 hash: 5d6dcac8f45a04eed25de2553fa786027a965de8cb60b4e8c095bfdce3e7cc66eeb78f3df8f62d0c612e383f6c6c21b9
SHA1 hash: 12fdeafbbfe94613d6edfde496da70e67e4d4769
MD5 hash: 7c287256b67eecee91a90491373daf03
humanhash: quebec-speaker-four-uranus
File name:sk
Download: download sample
Signature Mirai
File size:1'241 bytes
First seen:2025-12-05 18:24:42 UTC
Last seen:Never
File type: sh
MIME type:text/x-shellscript
ssdeep 24:QXzFxrFl5wrFzrF2rFAyrFSrFFrFArFMrFDrFASrF7rF4t:Qj7rf2r9rgrXrgrLrSrmrprDrBrqt
TLSH T1BA21327C06065EF4808DD43E7292C40A70A24FDF543B8B946E481A7D34E04DF6135E05
TrID 70.0% (.SH) Linux/UNIX shell script (7000/1)
30.0% (.) Unix-like shebang (var.3) (gen) (3000/1)
Magika shell
Reporter abuse_ch
Tags:sh
URLMalware sample (SHA256 hash)SignatureTags
http://213.209.143.64/splarm7d879b6d1a523fc7b10eec5dec0ebcd1b8068317a7d3633522ce439cc33f7aec Miraielf mirai ua-wget
http://213.209.143.64/splarm54c5fa8a02e9565a932998d71e214a1307efce9f619aa344771780899f5a81aae Miraielf mirai ua-wget
http://213.209.143.64/splarm62fb9451a89a7ff854b1e2669f3be8b8d0829d40165490c78daf19aad4c927bb5 Miraielf mirai ua-wget
http://213.209.143.64/splarm7bbe9f2fbdcbdbc2571b15610d4f09c1553128665024b8c87fa973a21267e5941 Miraicensys elf mirai ua-wget
http://213.209.143.64/splm68k5400fc18e11891a9cc9161c481fb30ccfb4fd47da6d4a776a1394b2e281912fd Miraielf mirai ua-wget
http://213.209.143.64/splmips633397cf2ca1b26757c7f32fe2e980ea66f783becff9455e11ded00b20032417 Miraielf mirai ua-wget
http://213.209.143.64/splmpsl61d0e0c8b1e9fdf341c8bbaacc50fe6cc5c5f73d4b7cb0f80808e6fedbf70d3c Miraielf mirai ua-wget
http://213.209.143.64/splppc090775980fcf2b3d9ad493e91f09cfd0144cb440c4ddb7905b612423270ed0c7 Miraielf mirai ua-wget
http://213.209.143.64/splsh4d39d7ccf377397081c53dee6f60a4fdd38d4ad1d56b81f6e1a79d1ac85d5dced Miraielf mirai ua-wget
http://213.209.143.64/splspc7d299710602ad14a13c3b9bec5df9f3e2427d0448b2b4094ac7c592945512b09 Miraielf mirai ua-wget
http://213.209.143.64/splx866fac75b407df3ab3700d15c5b3065228db4c6ebc93aac9958c525f079e4e552e Miraicensys elf mirai ua-wget
http://213.209.143.64/spli586n/an/aelf ua-wget
http://213.209.143.64/spli686n/an/aelf ua-wget

Intelligence


File Origin
# of uploads :
1
# of downloads :
34
Origin country :
DE DE
Vendor Threat Intelligence
No detections
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
evasive
Verdict:
Malicious
Labled as:
Trojan[Downloader]/Shell.Agent
Verdict:
Malicious
File Type:
unix shell
First seen:
2025-12-05T16:42:00Z UTC
Last seen:
2025-12-06T17:21:00Z UTC
Hits:
~10
Threat name:
Linux.Downloader.ShellAgnt
Status:
Malicious
First seen:
2025-12-05 18:36:37 UTC
File Type:
Text (Shell)
AV detection:
20 of 38 (52.63%)
Threat level:
  3/5
Result
Malware family:
n/a
Score:
  9/10
Tags:
credential_access defense_evasion discovery linux
Behaviour
Reads runtime system information
System Network Configuration Discovery
Changes its process name
Reads system network configuration
Reads process memory
Enumerates active TCP sockets
Enumerates running processes
File and Directory Permissions Modification
Executes dropped EXE
Renames itself
Contacts a large (69491) amount of remote hosts
Creates a large amount of network flows
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh 4816c6dc6bb538172c0ad662db48a8787a9e0a258b727f01ca93bfbf70c90e06

(this sample)

  
Delivery method
Distributed via web download

Comments