MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 5086f4d3eff992a3c5c5936266cdd2ffd8a3952f49b8e58b40c44e9ea5619d55. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 8


Intelligence 8 IOCs YARA 1 File information Comments

SHA256 hash: 5086f4d3eff992a3c5c5936266cdd2ffd8a3952f49b8e58b40c44e9ea5619d55
SHA3-384 hash: f5e854f41fbca680e08267532559ac4e2f12aa1adabd3065e68dcb2e7062c18695c568f165875f72e0c677a2f61bac91
SHA1 hash: 544131850f56e8d34f321cb8afce435c19f9fcb5
MD5 hash: 0759af58c7af255f303cb3e26a1d28f6
humanhash: summer-lemon-hot-hamper
File name:hidden.sh
Download: download sample
Signature Mirai
File size:2'061 bytes
First seen:2025-05-11 13:57:27 UTC
Last seen:Never
File type: sh
MIME type:text/x-shellscript
ssdeep 48:vp/z/U/p/W/Rp/KO/K7p/R5/RCpp/Rm/RRjLp/R7/RYHJp/Rs/RzLp/o/pp///O6:vFzCFkRFLuFR1RCpFRURRjLFRbRYpFR7
TLSH T10141958521C253B2ACF5DA5271B99C0C3091A8DBA6F62F0AD8DC74E4C0DDD48B192FE2
Magika shell
Reporter abuse_ch
Tags:mirai sh
URLMalware sample (SHA256 hash)SignatureTags
http://176.65.141.210/navo.x86bdb702657db4a6fb1616b42e6a2cd457a76e48e866edeea479be35711b518447 Miraielf mirai ua-wget
http://176.65.141.210/navo.mipsd06165b8132be657be9e85cc65cc5f2d701656d9ed3f0250defc4d0746c7927b Miraielf mirai ua-wget
http://176.65.141.210/navo.mpsl741ba2d53d54dc42195da1268d8680ab395f74d79bb90710910d9d597fc7b152 Miraielf mirai ua-wget
http://176.65.141.210/navo.armc3c2ed4c2a13f3244b9ad4f21816703bb5bddb7aa8505888c838c2a7eece9dbe Miraielf mirai ua-wget
http://176.65.141.210/navo.arm5fa7577577f7cee474d3276a04db1543b3bdb1bba1ca7a05262f67588360ee077 Miraielf mirai ua-wget
http://176.65.141.210/navo.arm6cdd280215ecf04e93af5a7bb70005d71bf860a52bff3e691135d585eff09bcc5 Miraielf mirai ua-wget
http://176.65.141.210/navo.arm7d338e32bb255f02484b9a24117a0cc0fbc151eed3bb690a83b14f015dd757811 Miraielf mirai ua-wget
http://176.65.141.210/navo.ppcdb3d12a2e4ebbffe25f4088c934f8d51feb3b50c435086bbe80459edf5d8e2c7 Miraielf mirai ua-wget
http://176.65.141.210/navo.m68k17d4ee1b8bac608dc2e6333a73a145509392fc65f2700c327405033a6f352bdf Miraielf mirai ua-wget
http://176.65.141.210/navo.x86_64a82dbcea4986e0340fa08abfa26a123832f62de58bf37e27ab1cda7fb40b96da Miraielf mirai ua-wget
http://176.65.141.210/navo.sh4c89055af96171ca11e02cda5da78991bc1d496ce0f15df3d9709fc52e7cebd20 Miraielf mirai ua-wget

Intelligence


File Origin
# of uploads :
1
# of downloads :
97
Origin country :
DE DE
Vendor Threat Intelligence
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
bash lolbin mirai remote
Threat name:
Linux.Downloader.Morila
Status:
Malicious
First seen:
2025-05-11 13:58:10 UTC
File Type:
Text (Shell)
AV detection:
17 of 24 (70.83%)
Threat level:
  3/5
Result
Malware family:
Score:
  10/10
Tags:
family:mirai antivm botnet defense_evasion discovery linux
Behaviour
Reads runtime system information
System Network Configuration Discovery
Writes file to tmp directory
Changes its process name
Checks CPU configuration
File and Directory Permissions Modification
Deletes itself
Executes dropped EXE
Traces itself
Mirai
Mirai family
Malware Config
C2 Extraction:
mywebh.kro.kr
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Linux_Shellscript_Downloader
Author:albertzsigovits
Description:Generic Approach to Shellscript downloaders

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh 5086f4d3eff992a3c5c5936266cdd2ffd8a3952f49b8e58b40c44e9ea5619d55

(this sample)

Comments