MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 4dd5fec43f7842b483fb2fcae47039da913dc16dcfb09c8db2f330d4c531dcac. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 6


Intelligence 6 IOCs YARA 1 File information Comments

SHA256 hash: 4dd5fec43f7842b483fb2fcae47039da913dc16dcfb09c8db2f330d4c531dcac
SHA3-384 hash: b188a6c663b0e0859871ea9f46e62d429717cf8dd308987f12c0ad6efd8f7dbd129bd787b333f99f16e8bed232c421a2
SHA1 hash: e1b2caa060e227e49c7e9e8868dbc720218eef40
MD5 hash: fad9ae5898ab08c4639d80b35ca1e751
humanhash: beer-vegan-jupiter-carolina
File name:dvr.sh
Download: download sample
Signature Mirai
File size:577 bytes
First seen:2025-12-21 01:40:57 UTC
Last seen:2025-12-21 21:06:18 UTC
File type: sh
MIME type:text/plain
ssdeep 12:t9ouZDSHHWNZSqHWN0yzvS0yzMHWNfIjDSfIMHWNKDS7HWq:t9ouZ2nWNU8WN0yza0yzGWNfZfhWNK2d
TLSH T1B6F0F9DF0274049551C1F96DB9A34CB9B00A66D93AC90B8CE8AD0C3911CD93CF431F99
Magika batch
Reporter abuse_ch
Tags:sh
URLMalware sample (SHA256 hash)SignatureTags
http://6yd.ru/mips7650d567c04ce00a1fa50841f42593319fa13f99c94daefc0febae5b48ab00d4 Mirai32-bit elf mirai ua-wget
http://6yd.ru/mpsl9597a80f69b1dcf45c78cbb72cc519e19c4299eef0d2b3e6c3bdc9aa19210255 Miraielf mirai ua-wget
http://6yd.ru/arm4n/an/aelf mirai ua-wget
http://6yd.ru/arm5371e0cffe2f794224ef69193da697e7d2a8a18b6df44d4f90488797e3630143c Miraielf mirai ua-wget
http://6yd.ru/arm7da83bdfce452041df71007b1463e562cc3403c9d01ed9fd97e6bc96ea47d2e36 Miraielf mirai ua-wget

Intelligence


File Origin
# of uploads :
2
# of downloads :
39
Origin country :
DE DE
Vendor Threat Intelligence
No detections
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
busybox evasive mirai
Verdict:
Malicious
File Type:
text
First seen:
2025-12-20T23:50:00Z UTC
Last seen:
2025-12-22T08:27:00Z UTC
Hits:
~10
Status:
terminated
Behavior Graph:
%3 guuid=a02225f1-1800-0000-321c-ae0350140000 pid=5200 /usr/bin/sudo guuid=add4f4f2-1800-0000-321c-ae0351140000 pid=5201 /tmp/sample.bin guuid=a02225f1-1800-0000-321c-ae0350140000 pid=5200->guuid=add4f4f2-1800-0000-321c-ae0351140000 pid=5201 execve guuid=977629f3-1800-0000-321c-ae0352140000 pid=5202 /usr/bin/mkdir guuid=add4f4f2-1800-0000-321c-ae0351140000 pid=5201->guuid=977629f3-1800-0000-321c-ae0352140000 pid=5202 execve guuid=97c08cf3-1800-0000-321c-ae0353140000 pid=5203 /usr/bin/dash guuid=add4f4f2-1800-0000-321c-ae0351140000 pid=5201->guuid=97c08cf3-1800-0000-321c-ae0353140000 pid=5203 clone guuid=ccfca5fa-1800-0000-321c-ae0355140000 pid=5205 /usr/bin/chmod guuid=add4f4f2-1800-0000-321c-ae0351140000 pid=5201->guuid=ccfca5fa-1800-0000-321c-ae0355140000 pid=5205 execve guuid=654df3fa-1800-0000-321c-ae0356140000 pid=5206 /usr/bin/dash guuid=add4f4f2-1800-0000-321c-ae0351140000 pid=5201->guuid=654df3fa-1800-0000-321c-ae0356140000 pid=5206 clone guuid=72f991fb-1800-0000-321c-ae0358140000 pid=5208 /usr/bin/rm delete-file guuid=add4f4f2-1800-0000-321c-ae0351140000 pid=5201->guuid=72f991fb-1800-0000-321c-ae0358140000 pid=5208 execve guuid=f817e9fb-1800-0000-321c-ae0359140000 pid=5209 /usr/bin/dash guuid=add4f4f2-1800-0000-321c-ae0351140000 pid=5201->guuid=f817e9fb-1800-0000-321c-ae0359140000 pid=5209 clone guuid=3538ac04-1900-0000-321c-ae035e140000 pid=5214 /usr/bin/chmod guuid=add4f4f2-1800-0000-321c-ae0351140000 pid=5201->guuid=3538ac04-1900-0000-321c-ae035e140000 pid=5214 execve guuid=e2cc2108-1900-0000-321c-ae035f140000 pid=5215 /usr/bin/dash guuid=add4f4f2-1800-0000-321c-ae0351140000 pid=5201->guuid=e2cc2108-1900-0000-321c-ae035f140000 pid=5215 clone guuid=9c630e09-1900-0000-321c-ae0362140000 pid=5218 /usr/bin/rm delete-file guuid=add4f4f2-1800-0000-321c-ae0351140000 pid=5201->guuid=9c630e09-1900-0000-321c-ae0362140000 pid=5218 execve guuid=a5744e09-1900-0000-321c-ae0364140000 pid=5220 /usr/bin/dash guuid=add4f4f2-1800-0000-321c-ae0351140000 pid=5201->guuid=a5744e09-1900-0000-321c-ae0364140000 pid=5220 clone guuid=7084c50f-1900-0000-321c-ae036c140000 pid=5228 /usr/bin/chmod guuid=add4f4f2-1800-0000-321c-ae0351140000 pid=5201->guuid=7084c50f-1900-0000-321c-ae036c140000 pid=5228 execve guuid=95a2ff0f-1900-0000-321c-ae036d140000 pid=5229 /usr/bin/dash guuid=add4f4f2-1800-0000-321c-ae0351140000 pid=5201->guuid=95a2ff0f-1900-0000-321c-ae036d140000 pid=5229 clone guuid=90b77210-1900-0000-321c-ae036f140000 pid=5231 /usr/bin/rm delete-file guuid=add4f4f2-1800-0000-321c-ae0351140000 pid=5201->guuid=90b77210-1900-0000-321c-ae036f140000 pid=5231 execve guuid=e884ab10-1900-0000-321c-ae0370140000 pid=5232 /usr/bin/dash guuid=add4f4f2-1800-0000-321c-ae0351140000 pid=5201->guuid=e884ab10-1900-0000-321c-ae0370140000 pid=5232 clone guuid=244c0c17-1900-0000-321c-ae0372140000 pid=5234 /usr/bin/chmod guuid=add4f4f2-1800-0000-321c-ae0351140000 pid=5201->guuid=244c0c17-1900-0000-321c-ae0372140000 pid=5234 execve guuid=03804517-1900-0000-321c-ae0373140000 pid=5235 /usr/bin/dash guuid=add4f4f2-1800-0000-321c-ae0351140000 pid=5201->guuid=03804517-1900-0000-321c-ae0373140000 pid=5235 clone guuid=3f08bd17-1900-0000-321c-ae0375140000 pid=5237 /usr/bin/rm delete-file guuid=add4f4f2-1800-0000-321c-ae0351140000 pid=5201->guuid=3f08bd17-1900-0000-321c-ae0375140000 pid=5237 execve guuid=0a71f817-1900-0000-321c-ae0376140000 pid=5238 /usr/bin/dash guuid=add4f4f2-1800-0000-321c-ae0351140000 pid=5201->guuid=0a71f817-1900-0000-321c-ae0376140000 pid=5238 clone guuid=e23aee1d-1900-0000-321c-ae0378140000 pid=5240 /usr/bin/chmod guuid=add4f4f2-1800-0000-321c-ae0351140000 pid=5201->guuid=e23aee1d-1900-0000-321c-ae0378140000 pid=5240 execve guuid=8824311e-1900-0000-321c-ae0379140000 pid=5241 /usr/bin/dash guuid=add4f4f2-1800-0000-321c-ae0351140000 pid=5201->guuid=8824311e-1900-0000-321c-ae0379140000 pid=5241 clone guuid=33e4c21e-1900-0000-321c-ae037b140000 pid=5243 /usr/bin/rm delete-file guuid=add4f4f2-1800-0000-321c-ae0351140000 pid=5201->guuid=33e4c21e-1900-0000-321c-ae037b140000 pid=5243 execve guuid=73aa9af3-1800-0000-321c-ae0354140000 pid=5204 /usr/bin/wget dns net send-data write-file guuid=97c08cf3-1800-0000-321c-ae0353140000 pid=5203->guuid=73aa9af3-1800-0000-321c-ae0354140000 pid=5204 execve 4f6baed0-9587-596c-82b3-fd721afe4cc1 10.0.2.3:53 guuid=73aa9af3-1800-0000-321c-ae0354140000 pid=5204->4f6baed0-9587-596c-82b3-fd721afe4cc1 send: 48B a426af05-0fe5-5064-9002-84e3f002b7b9 6yd.ru:80 guuid=73aa9af3-1800-0000-321c-ae0354140000 pid=5204->a426af05-0fe5-5064-9002-84e3f002b7b9 send: 125B guuid=7a18f4fb-1800-0000-321c-ae035a140000 pid=5210 /usr/bin/wget dns net send-data write-file guuid=f817e9fb-1800-0000-321c-ae0359140000 pid=5209->guuid=7a18f4fb-1800-0000-321c-ae035a140000 pid=5210 execve guuid=7a18f4fb-1800-0000-321c-ae035a140000 pid=5210->4f6baed0-9587-596c-82b3-fd721afe4cc1 send: 48B guuid=7a18f4fb-1800-0000-321c-ae035a140000 pid=5210->a426af05-0fe5-5064-9002-84e3f002b7b9 send: 125B guuid=222f5609-1900-0000-321c-ae0365140000 pid=5221 /usr/bin/wget dns net send-data write-file guuid=a5744e09-1900-0000-321c-ae0364140000 pid=5220->guuid=222f5609-1900-0000-321c-ae0365140000 pid=5221 execve guuid=222f5609-1900-0000-321c-ae0365140000 pid=5221->4f6baed0-9587-596c-82b3-fd721afe4cc1 send: 48B guuid=222f5609-1900-0000-321c-ae0365140000 pid=5221->a426af05-0fe5-5064-9002-84e3f002b7b9 send: 125B guuid=85d3b410-1900-0000-321c-ae0371140000 pid=5233 /usr/bin/wget dns net send-data write-file guuid=e884ab10-1900-0000-321c-ae0370140000 pid=5232->guuid=85d3b410-1900-0000-321c-ae0371140000 pid=5233 execve guuid=85d3b410-1900-0000-321c-ae0371140000 pid=5233->4f6baed0-9587-596c-82b3-fd721afe4cc1 send: 48B guuid=85d3b410-1900-0000-321c-ae0371140000 pid=5233->a426af05-0fe5-5064-9002-84e3f002b7b9 send: 125B guuid=4e350018-1900-0000-321c-ae0377140000 pid=5239 /usr/bin/wget dns net send-data write-file guuid=0a71f817-1900-0000-321c-ae0376140000 pid=5238->guuid=4e350018-1900-0000-321c-ae0377140000 pid=5239 execve guuid=4e350018-1900-0000-321c-ae0377140000 pid=5239->4f6baed0-9587-596c-82b3-fd721afe4cc1 send: 48B guuid=4e350018-1900-0000-321c-ae0377140000 pid=5239->a426af05-0fe5-5064-9002-84e3f002b7b9 send: 125B
Threat name:
Script-Shell.Trojan.Heuristic
Status:
Malicious
First seen:
2025-12-21 01:41:15 UTC
File Type:
Text (Shell)
AV detection:
11 of 36 (30.56%)
Threat level:
  2/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Modifies registry class
Suspicious use of SetWindowsHookEx
Enumerates physical storage devices
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:ach_202412_suspect_bash_script
Author:abuse.ch
Description:Detects suspicious Linux bash scripts

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh 4dd5fec43f7842b483fb2fcae47039da913dc16dcfb09c8db2f330d4c531dcac

(this sample)

  
Delivery method
Distributed via web download

Comments