MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 4d169cc73f0389c86d0e4d3df5a38042f38da00a3fe474275a2a1894fbbbee66. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 7


Intelligence 7 IOCs YARA 1 File information Comments

SHA256 hash: 4d169cc73f0389c86d0e4d3df5a38042f38da00a3fe474275a2a1894fbbbee66
SHA3-384 hash: f0cb855b5326f08586a81904caecf3f43d0b0f9038d0bb1e69f58a21ac3870b73c7b8958fd1b46a10cfc217b6e9b0311
SHA1 hash: 99bef53f8886ad92234995cfe26866a691b5b635
MD5 hash: e1af8abd9f7747840e62b243b8ce889f
humanhash: louisiana-may-helium-don
File name:Sassy-Cats.sh
Download: download sample
Signature Mirai
File size:2'174 bytes
First seen:2026-04-15 23:37:44 UTC
Last seen:Never
File type: sh
MIME type:text/x-shellscript
ssdeep 24:Rv/vpbEGEPvFH2kEkEpvqv+cE6mfvBvvVE3hvqv+cE6FgvgRFvgRTgRBEgR/zgRK:TXcHPyPzBRA+rbdULSy0lZJoJHAjCI
TLSH T12D41338947E0238EF5C48E07FC9D8D7960D7A5A015AC5900E0780DF2A2BF987B6F9667
TrID 70.0% (.SH) Linux/UNIX shell script (7000/1)
30.0% (.) Unix-like shebang (var.3) (gen) (3000/1)
Magika shell
Reporter abuse_ch
Tags:sh
URLMalware sample (SHA256 hash)SignatureTags
http://46.101.46.29/.Sassy/.Sassy.x86_64ecf3db15e6f1b63848133bf3bcbd2159e54469886c1088630d789cba08ddacca Miraielf mirai opendir ua-wget
http://46.101.46.29/.Sassy.aarch64n/an/aelf opendir ua-wget
http://46.101.46.29/.Sassy/.Sassy.m68kce9a05f2f5ce82cd3a4345423047209e347fb64d7c7cb2c34510e4a4186e3d58 Miraielf mirai opendir ua-wget
http://46.101.46.29/.Sassy/.Sassy.mips7bf180a23a1791906926eeba7b9a1221eafec493a8f17ef728e684d5c32d9afd Miraielf mirai opendir ua-wget
http://46.101.46.29/.Sassy/.Sassy.mipselab49bad666a613ef9463a859c84d2784190b679056c7ea8d73708dd63342d4dc Miraielf mirai opendir ua-wget
http://46.101.46.29/.Sassy/.Sassy.powerpcf98ead1adc036df4db2dc85d929868b1a2a4f928bc21f3289c62789638d8895a Miraielf mirai opendir ua-wget
http://46.101.46.29/.Sassy/.Sassy.sparccce4491ecb2ed2904d0ca07e99fea9c2d2e7a6bebc89832258f0e0e7cb754e85 Miraielf mirai opendir ua-wget
http://46.101.46.29/.Sassy/.Sassy.sh43b45af43b673ee124c89887e3aad20e888a5e645d7cfc7279f24278f4352a5c1 Miraielf mirai opendir ua-wget
http://46.101.46.29/.Sassy/.Sassy.arccbad2d84ad74e4a952f8a76dc0393c4957789b0b57ba928851c6958a44a832e0 Miraielf mirai opendir ua-wget
http://46.101.46.29/.Sassy/.Sassy.i4866bc2a651fe1fa718397d940038c2dd042dc8713067b89d9b27c223b1f599c553 Miraielf mirai opendir ua-wget
http://46.101.46.29/.Sassy/.Sassy.armv4l0a420f2779dc2b65ca5ac612b9d2d506fca39a7b2f1f52378156927a9dee72b7 Miraielf mirai opendir ua-wget
http://46.101.46.29/.Sassy/.Sassy.armv5l5260262c2e02485e8d13eaad74c36ec4e5043f41a9484d4e76395b4cc91130a6 Miraielf mirai opendir ua-wget
http://46.101.46.29/.Sassy/.Sassy.armv6laba7bc64fa57c4acb34a72b172b79add710a327b54d3ce3a01d77c2bf3ec31d1 Miraielf mirai opendir ua-wget
http://46.101.46.29/.Sassy/.Sassy.armv7l8deeea0a052e3acd8818c4cd95825347ccdb37d0870befccc6027a21d937819d Miraielf mirai opendir ua-wget

Intelligence


File Origin
# of uploads :
1
# of downloads :
36
Origin country :
DE DE
Vendor Threat Intelligence
No detections
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
mirai
Result
Gathering data
Verdict:
Malicious
File Type:
UnixScript
First seen:
2026-04-15T15:34:00Z UTC
Last seen:
2026-04-15T15:34:00Z UTC
Hits:
~10
Threat name:
Script-Shell.Downloader.Heuristic
Status:
Malicious
First seen:
2026-04-15 23:38:42 UTC
File Type:
Text (Shell)
AV detection:
8 of 36 (22.22%)
Threat level:
  2/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
defense_evasion discovery linux upx
Behaviour
Reads runtime system information
System Network Configuration Discovery
Writes file to tmp directory
Changes its process name
UPX packed file
Enumerates running processes
File and Directory Permissions Modification
Deletes itself
Executes dropped EXE
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:MAL_Linux_IoT_MultiArch_BotnetLoader_Generic
Author:Anish Bogati
Description:Technique-based detection of IoT/Linux botnet loader shell scripts downloading binaries from numeric IPs, chmodding, and executing multi-architecture payloads
Reference:MalwareBazaar sample lilin.sh

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh 4d169cc73f0389c86d0e4d3df5a38042f38da00a3fe474275a2a1894fbbbee66

(this sample)

  
Delivery method
Distributed via web download

Comments