MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 4fae28cab831b698fe8b0e7f5ca426c6b4f146109f38eda21280be426ff68704. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 9


Intelligence 9 IOCs YARA 2 File information Comments

SHA256 hash: 4fae28cab831b698fe8b0e7f5ca426c6b4f146109f38eda21280be426ff68704
SHA3-384 hash: 3d19ed68a6514d004e42472131bf151d7edd59c85599a28998d678cfe546dfdba8c8d80c7462657cede781af863313f1
SHA1 hash: b2b301254cb66eda6e53f0486b8295b9391ee45c
MD5 hash: cdf51b2d57da9b8f41cd39e08fcd303d
humanhash: one-burger-xray-lactose
File name:wget.sh
Download: download sample
Signature Mirai
File size:2'181 bytes
First seen:2025-03-03 09:41:43 UTC
Last seen:Never
File type: sh
MIME type:text/x-shellscript
ssdeep 48:v5/2SS5IT91j5CYCju+53+aa5a5hl5lYgo5Yj735uVRt5jC+O5CR5d5ShVBm:vMSSQ91jUu+caaghlMgog73CRtE+OI5J
TLSH T1594126C615404B393CF7D9FF72E9452872A3C49AA2CE8FE29ED934B7804DE14B44164E
Magika shell
Reporter abuse_ch
Tags:mirai sh
URLMalware sample (SHA256 hash)SignatureTags
http://193.143.1.118/main_x8681f9c2d8247c1d68f0cee5d1e08a2e89f09807963a3e70ce9db0a71331839bb0 Miraielf mirai
http://193.143.1.118/main_mipsdc00cf8020ba7134efb103c9d30637793ed981804589bf2b081efde3ed61d9c1 Miraielf mirai
http://193.143.1.118/main_mpsla98563480f24c50ec49e27f645ade1cc439232fcad0eaff8271cfd160fd0f84d Miraielf mirai
http://193.143.1.118/main_arm56307af999bc104d587942e764d10e960af890343ce1d31e9ac461bde7cf35f7 Miraielf mirai
http://193.143.1.118/main_arm511fc7ab0cfc69108ce6caeccabba24a0ff81481457c557eff4778fd2e6198c4a Miraielf mirai
http://193.143.1.118/main_arm6d444b76ef69c3eefb18f4558217f8a7c6b1ab1204896331455ad0521c859c986 Miraielf mirai
http://193.143.1.118/main_arm7a281c6cfe04bf57796ffffb322ee6cb51aefd5b9f6a941b01a767ce3b019dafe Miraielf mirai
http://193.143.1.118/main_ppcf3280586ce97dda47ef415f2f9f9640ed15f520c1d752e4ad1fd829b0951bb5e Miraielf mirai
http://193.143.1.118/main_m68kbfd67a7409994fb43178144afe356a49217a5248428434a92d94826e8dcf1ff6 Miraielf mirai
http://193.143.1.118/main_x86_64e3772d42fcaf36bab152c036f9d9f298b1d8fcb485500ea4bc890aaa4499d1d7 Miraielf mirai
http://193.143.1.118/main_sh48b3ba98a3ca2c1c21ae72896ade2272c369c5072ba1b02209d7a59cb9f5a3c19 Miraielf mirai

Intelligence


File Origin
# of uploads :
1
# of downloads :
101
Origin country :
DE DE
Vendor Threat Intelligence
Verdict:
Malicious
Score:
99.1%
Tags:
trojandownloader agent virus
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
bash evasive lolbin mirai remote
Result
Verdict:
MALICIOUS
Threat name:
Linux.Downloader.Morila
Status:
Malicious
First seen:
2025-03-03 09:42:10 UTC
File Type:
Text (Shell)
AV detection:
16 of 24 (66.67%)
Threat level:
  3/5
Result
Malware family:
Score:
  10/10
Tags:
family:mirai antivm botnet defense_evasion discovery linux
Behaviour
Reads runtime system information
System Network Configuration Discovery
Writes file to tmp directory
Changes its process name
Checks CPU configuration
File and Directory Permissions Modification
Deletes itself
Executes dropped EXE
Traces itself
Mirai
Mirai family
Malware Config
C2 Extraction:
angela.spklove.com
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:ach_202412_suspect_bash_script
Author:abuse.ch
Description:Detects suspicious Linux bash scripts
Rule name:Linux_Shellscript_Downloader
Author:albertzsigovits
Description:Generic Approach to Shellscript downloaders

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh 4fae28cab831b698fe8b0e7f5ca426c6b4f146109f38eda21280be426ff68704

(this sample)

  
Delivery method
Distributed via web download

Comments