MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 50eb5a50663c0bf0014577b2abe1baff453aebc6a109aa7c283dbbbf20f7998f. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 7


Intelligence 7 IOCs YARA 1 File information Comments

SHA256 hash: 50eb5a50663c0bf0014577b2abe1baff453aebc6a109aa7c283dbbbf20f7998f
SHA3-384 hash: da99a408c69d87f8a6e8407fece761fe94f6ed76beb4419e402210684a817fb37e38b80b6afe3db4eeda999ae4a6ba9f
SHA1 hash: d78f90e2d5e3ce9612ee145c47ed8b3324d34568
MD5 hash: 1d7f5fe93a49193020ab25f13ae6c170
humanhash: bacon-missouri-connecticut-spaghetti
File name:cat.sh
Download: download sample
Signature Mirai
File size:1'845 bytes
First seen:2026-02-04 07:43:07 UTC
Last seen:Never
File type: sh
MIME type:text/x-shellscript
ssdeep 24:9Ddc+1mnmBM/h291bBV2wK6fwo7mgKLJ54HH9:c+1m3no7m4
TLSH T1D831118E64B412CD89CFCE4070E54DC8670B9592F1942732EDC20E6BA09DD6434ABFB7
TrID 70.0% (.SH) Linux/UNIX shell script (7000/1)
30.0% (.) Unix-like shebang (var.3) (gen) (3000/1)
Magika shell
Reporter abuse_ch
Tags:sh
URLMalware sample (SHA256 hash)SignatureTags
http://64.89.161.81/iran.x86_6497ff91263d654f2e91f066adeaedc41269b037eb4e15662acda0f460f8ba6eb8 Miraielf ua-wget
http://64.89.161.81/iran.aarch64n/an/aelf ua-wget
http://64.89.161.81/iran.m68ke43183dbb41cf7c66de3f33898dedda25430535c183a4f096d1eaa32c7fbcba0 Miraielf ua-wget
http://64.89.161.81/iran.mips81f3b5c089e018318bdb3fa94e11acd72440b657717ee428ece1035705f4bb82 Miraielf ua-wget
http://64.89.161.81/iran.mipself5d72fc2d4815915fe0a4b83cb0235b36602f679c63a32575c97d97baa796bfd Miraielf ua-wget
http://64.89.161.81/iran.powerpc4fd3225dcbd9cf14b2ddbf4f245463f81558e76e718efd03b9073c7863fcbcae Miraielf ua-wget
http://64.89.161.81/iran.sparc36468c20d264ea58e811b26112b17355c610f9e800ef5a2b6ab660ae28da7c73 Miraielf ua-wget
http://64.89.161.81/iran.sh466bfd1c57bb7dc12ba5a712af051bdee07aaa52d4065d4067b26023d2f940550 Miraielf ua-wget
http://64.89.161.81/iran.arc6e29b244afa34e79c0dc5ac4d38f6ace3e9e049996ab9fcf5b697ecd0819a5e6 Miraielf ua-wget
http://64.89.161.81/iran.i486f1cdaece1890026be4adc17b0d11a0a4eea9d11d953047edf8078bfa5688d587 Miraielf ua-wget
http://64.89.161.81/iran.armv4l7b4d33f3f6e14a5a929d778588cdf1fb82c939037610c88c0f0a0cfedaa43ea3 Miraielf ua-wget
http://64.89.161.81/iran.armv5la1a959b80cc8d75a4631444492b52d70b9ce035d6cbee1c28a685580585b5805 Miraielf ua-wget
http://64.89.161.81/iran.armv6l811e37d35407d436e4a6677eb25664440773e12e5593feaa37575e0bdcfbdf9b Miraielf ua-wget
http://64.89.161.81/iran.armv7l1cbd717a85a0a385bf3803497cac556910dc76c0c206467cacefe582b655f57e Miraielf ua-wget

Intelligence


File Origin
# of uploads :
1
# of downloads :
36
Origin country :
DE DE
Vendor Threat Intelligence
No detections
Result
Gathering data
Verdict:
Malicious
File Type:
unix shell
First seen:
2026-02-01T15:47:00Z UTC
Last seen:
2026-02-01T16:53:00Z UTC
Hits:
~10
Detections:
HEUR:Trojan-Downloader.Shell.Agent.a
Status:
terminated
Behavior Graph:
%3 guuid=06744be7-1a00-0000-4b8e-1784e20a0000 pid=2786 /usr/bin/sudo guuid=7f3a47ea-1a00-0000-4b8e-1784e50a0000 pid=2789 /tmp/sample.bin guuid=06744be7-1a00-0000-4b8e-1784e20a0000 pid=2786->guuid=7f3a47ea-1a00-0000-4b8e-1784e50a0000 pid=2789 execve guuid=a18c7cea-1a00-0000-4b8e-1784e70a0000 pid=2791 /usr/bin/wget net send-data write-file guuid=7f3a47ea-1a00-0000-4b8e-1784e50a0000 pid=2789->guuid=a18c7cea-1a00-0000-4b8e-1784e70a0000 pid=2791 execve guuid=677e42f0-1a00-0000-4b8e-1784f70a0000 pid=2807 /usr/bin/chmod guuid=7f3a47ea-1a00-0000-4b8e-1784e50a0000 pid=2789->guuid=677e42f0-1a00-0000-4b8e-1784f70a0000 pid=2807 execve guuid=897418f1-1a00-0000-4b8e-1784f80a0000 pid=2808 /home/sandbox/iran.x86_64 mprotect-exec guuid=7f3a47ea-1a00-0000-4b8e-1784e50a0000 pid=2789->guuid=897418f1-1a00-0000-4b8e-1784f80a0000 pid=2808 execve guuid=3516fcf2-1a00-0000-4b8e-1784fa0a0000 pid=2810 /usr/bin/wget net send-data guuid=7f3a47ea-1a00-0000-4b8e-1784e50a0000 pid=2789->guuid=3516fcf2-1a00-0000-4b8e-1784fa0a0000 pid=2810 execve guuid=03b1ccf7-1a00-0000-4b8e-1784010b0000 pid=2817 /usr/bin/curl net send-data write-file guuid=7f3a47ea-1a00-0000-4b8e-1784e50a0000 pid=2789->guuid=03b1ccf7-1a00-0000-4b8e-1784010b0000 pid=2817 execve guuid=0c95b703-1b00-0000-4b8e-1784150b0000 pid=2837 /usr/bin/chmod guuid=7f3a47ea-1a00-0000-4b8e-1784e50a0000 pid=2789->guuid=0c95b703-1b00-0000-4b8e-1784150b0000 pid=2837 execve guuid=94ab1604-1b00-0000-4b8e-1784170b0000 pid=2839 /home/sandbox/iran.aarch64 guuid=7f3a47ea-1a00-0000-4b8e-1784e50a0000 pid=2789->guuid=94ab1604-1b00-0000-4b8e-1784170b0000 pid=2839 execve guuid=31635904-1b00-0000-4b8e-1784190b0000 pid=2841 /usr/bin/wget net send-data write-file guuid=7f3a47ea-1a00-0000-4b8e-1784e50a0000 pid=2789->guuid=31635904-1b00-0000-4b8e-1784190b0000 pid=2841 execve guuid=7a3c030b-1b00-0000-4b8e-1784250b0000 pid=2853 /usr/bin/chmod guuid=7f3a47ea-1a00-0000-4b8e-1784e50a0000 pid=2789->guuid=7a3c030b-1b00-0000-4b8e-1784250b0000 pid=2853 execve guuid=e72c5d0b-1b00-0000-4b8e-1784260b0000 pid=2854 /usr/bin/dash guuid=7f3a47ea-1a00-0000-4b8e-1784e50a0000 pid=2789->guuid=e72c5d0b-1b00-0000-4b8e-1784260b0000 pid=2854 clone guuid=22ebff0b-1b00-0000-4b8e-1784290b0000 pid=2857 /usr/bin/wget net send-data write-file guuid=7f3a47ea-1a00-0000-4b8e-1784e50a0000 pid=2789->guuid=22ebff0b-1b00-0000-4b8e-1784290b0000 pid=2857 execve guuid=dfb10713-1b00-0000-4b8e-17843e0b0000 pid=2878 /usr/bin/chmod guuid=7f3a47ea-1a00-0000-4b8e-1784e50a0000 pid=2789->guuid=dfb10713-1b00-0000-4b8e-17843e0b0000 pid=2878 execve guuid=c9594513-1b00-0000-4b8e-1784400b0000 pid=2880 /usr/bin/dash guuid=7f3a47ea-1a00-0000-4b8e-1784e50a0000 pid=2789->guuid=c9594513-1b00-0000-4b8e-1784400b0000 pid=2880 clone guuid=ff31cc13-1b00-0000-4b8e-1784440b0000 pid=2884 /usr/bin/wget net send-data write-file guuid=7f3a47ea-1a00-0000-4b8e-1784e50a0000 pid=2789->guuid=ff31cc13-1b00-0000-4b8e-1784440b0000 pid=2884 execve guuid=2f7d351a-1b00-0000-4b8e-1784570b0000 pid=2903 /usr/bin/chmod guuid=7f3a47ea-1a00-0000-4b8e-1784e50a0000 pid=2789->guuid=2f7d351a-1b00-0000-4b8e-1784570b0000 pid=2903 execve guuid=e5fe951a-1b00-0000-4b8e-1784590b0000 pid=2905 /usr/bin/dash guuid=7f3a47ea-1a00-0000-4b8e-1784e50a0000 pid=2789->guuid=e5fe951a-1b00-0000-4b8e-1784590b0000 pid=2905 clone guuid=4792281b-1b00-0000-4b8e-17845d0b0000 pid=2909 /usr/bin/wget net send-data write-file guuid=7f3a47ea-1a00-0000-4b8e-1784e50a0000 pid=2789->guuid=4792281b-1b00-0000-4b8e-17845d0b0000 pid=2909 execve guuid=fa9eb021-1b00-0000-4b8e-1784710b0000 pid=2929 /usr/bin/chmod guuid=7f3a47ea-1a00-0000-4b8e-1784e50a0000 pid=2789->guuid=fa9eb021-1b00-0000-4b8e-1784710b0000 pid=2929 execve guuid=7bd7f121-1b00-0000-4b8e-1784730b0000 pid=2931 /usr/bin/dash guuid=7f3a47ea-1a00-0000-4b8e-1784e50a0000 pid=2789->guuid=7bd7f121-1b00-0000-4b8e-1784730b0000 pid=2931 clone guuid=1d7f8f22-1b00-0000-4b8e-1784770b0000 pid=2935 /usr/bin/wget net send-data write-file guuid=7f3a47ea-1a00-0000-4b8e-1784e50a0000 pid=2789->guuid=1d7f8f22-1b00-0000-4b8e-1784770b0000 pid=2935 execve guuid=4dd01e26-1b00-0000-4b8e-17847f0b0000 pid=2943 /usr/bin/chmod guuid=7f3a47ea-1a00-0000-4b8e-1784e50a0000 pid=2789->guuid=4dd01e26-1b00-0000-4b8e-17847f0b0000 pid=2943 execve guuid=eb418326-1b00-0000-4b8e-1784800b0000 pid=2944 /usr/bin/dash guuid=7f3a47ea-1a00-0000-4b8e-1784e50a0000 pid=2789->guuid=eb418326-1b00-0000-4b8e-1784800b0000 pid=2944 clone guuid=30205028-1b00-0000-4b8e-1784840b0000 pid=2948 /usr/bin/wget net send-data write-file guuid=7f3a47ea-1a00-0000-4b8e-1784e50a0000 pid=2789->guuid=30205028-1b00-0000-4b8e-1784840b0000 pid=2948 execve guuid=4d27382f-1b00-0000-4b8e-17848e0b0000 pid=2958 /usr/bin/chmod guuid=7f3a47ea-1a00-0000-4b8e-1784e50a0000 pid=2789->guuid=4d27382f-1b00-0000-4b8e-17848e0b0000 pid=2958 execve guuid=7c96972f-1b00-0000-4b8e-17848f0b0000 pid=2959 /usr/bin/dash guuid=7f3a47ea-1a00-0000-4b8e-1784e50a0000 pid=2789->guuid=7c96972f-1b00-0000-4b8e-17848f0b0000 pid=2959 clone guuid=d9315030-1b00-0000-4b8e-1784910b0000 pid=2961 /usr/bin/wget net send-data write-file guuid=7f3a47ea-1a00-0000-4b8e-1784e50a0000 pid=2789->guuid=d9315030-1b00-0000-4b8e-1784910b0000 pid=2961 execve guuid=1b85db36-1b00-0000-4b8e-17849a0b0000 pid=2970 /usr/bin/chmod guuid=7f3a47ea-1a00-0000-4b8e-1784e50a0000 pid=2789->guuid=1b85db36-1b00-0000-4b8e-17849a0b0000 pid=2970 execve guuid=f7592937-1b00-0000-4b8e-17849b0b0000 pid=2971 /usr/bin/dash guuid=7f3a47ea-1a00-0000-4b8e-1784e50a0000 pid=2789->guuid=f7592937-1b00-0000-4b8e-17849b0b0000 pid=2971 clone guuid=0735ba37-1b00-0000-4b8e-17849f0b0000 pid=2975 /usr/bin/wget net send-data write-file guuid=7f3a47ea-1a00-0000-4b8e-1784e50a0000 pid=2789->guuid=0735ba37-1b00-0000-4b8e-17849f0b0000 pid=2975 execve guuid=a626eb3c-1b00-0000-4b8e-1784ab0b0000 pid=2987 /usr/bin/chmod guuid=7f3a47ea-1a00-0000-4b8e-1784e50a0000 pid=2789->guuid=a626eb3c-1b00-0000-4b8e-1784ab0b0000 pid=2987 execve guuid=3eaa5e3d-1b00-0000-4b8e-1784ac0b0000 pid=2988 /home/sandbox/iran.i486 guuid=7f3a47ea-1a00-0000-4b8e-1784e50a0000 pid=2789->guuid=3eaa5e3d-1b00-0000-4b8e-1784ac0b0000 pid=2988 execve guuid=bf1bc93d-1b00-0000-4b8e-1784af0b0000 pid=2991 /usr/bin/wget net send-data write-file guuid=7f3a47ea-1a00-0000-4b8e-1784e50a0000 pid=2789->guuid=bf1bc93d-1b00-0000-4b8e-1784af0b0000 pid=2991 execve guuid=7cb96c46-1b00-0000-4b8e-1784ba0b0000 pid=3002 /usr/bin/chmod guuid=7f3a47ea-1a00-0000-4b8e-1784e50a0000 pid=2789->guuid=7cb96c46-1b00-0000-4b8e-1784ba0b0000 pid=3002 execve guuid=aadcdc46-1b00-0000-4b8e-1784bb0b0000 pid=3003 /usr/bin/dash guuid=7f3a47ea-1a00-0000-4b8e-1784e50a0000 pid=2789->guuid=aadcdc46-1b00-0000-4b8e-1784bb0b0000 pid=3003 clone guuid=7d0bb147-1b00-0000-4b8e-1784c00b0000 pid=3008 /usr/bin/wget net send-data write-file guuid=7f3a47ea-1a00-0000-4b8e-1784e50a0000 pid=2789->guuid=7d0bb147-1b00-0000-4b8e-1784c00b0000 pid=3008 execve guuid=5fdc814e-1b00-0000-4b8e-1784ca0b0000 pid=3018 /usr/bin/chmod guuid=7f3a47ea-1a00-0000-4b8e-1784e50a0000 pid=2789->guuid=5fdc814e-1b00-0000-4b8e-1784ca0b0000 pid=3018 execve guuid=5511ce4e-1b00-0000-4b8e-1784cb0b0000 pid=3019 /usr/bin/dash guuid=7f3a47ea-1a00-0000-4b8e-1784e50a0000 pid=2789->guuid=5511ce4e-1b00-0000-4b8e-1784cb0b0000 pid=3019 clone guuid=0f6a564f-1b00-0000-4b8e-1784cf0b0000 pid=3023 /usr/bin/wget net send-data write-file guuid=7f3a47ea-1a00-0000-4b8e-1784e50a0000 pid=2789->guuid=0f6a564f-1b00-0000-4b8e-1784cf0b0000 pid=3023 execve guuid=4941d055-1b00-0000-4b8e-1784e00b0000 pid=3040 /usr/bin/chmod guuid=7f3a47ea-1a00-0000-4b8e-1784e50a0000 pid=2789->guuid=4941d055-1b00-0000-4b8e-1784e00b0000 pid=3040 execve guuid=8d201f56-1b00-0000-4b8e-1784e20b0000 pid=3042 /usr/bin/dash guuid=7f3a47ea-1a00-0000-4b8e-1784e50a0000 pid=2789->guuid=8d201f56-1b00-0000-4b8e-1784e20b0000 pid=3042 clone guuid=3d856957-1b00-0000-4b8e-1784e80b0000 pid=3048 /usr/bin/wget net send-data write-file guuid=7f3a47ea-1a00-0000-4b8e-1784e50a0000 pid=2789->guuid=3d856957-1b00-0000-4b8e-1784e80b0000 pid=3048 execve guuid=df2bff5c-1b00-0000-4b8e-1784f20b0000 pid=3058 /usr/bin/chmod guuid=7f3a47ea-1a00-0000-4b8e-1784e50a0000 pid=2789->guuid=df2bff5c-1b00-0000-4b8e-1784f20b0000 pid=3058 execve guuid=6e3c415d-1b00-0000-4b8e-1784f40b0000 pid=3060 /usr/bin/dash guuid=7f3a47ea-1a00-0000-4b8e-1784e50a0000 pid=2789->guuid=6e3c415d-1b00-0000-4b8e-1784f40b0000 pid=3060 clone 638b1b62-8ce5-542b-af3e-4880cfa097a3 64.89.161.81:80 guuid=a18c7cea-1a00-0000-4b8e-1784e70a0000 pid=2791->638b1b62-8ce5-542b-af3e-4880cfa097a3 send: 138B guuid=6be4eef2-1a00-0000-4b8e-1784f90a0000 pid=2809 /home/sandbox/iran.x86_64 zombie guuid=897418f1-1a00-0000-4b8e-1784f80a0000 pid=2808->guuid=6be4eef2-1a00-0000-4b8e-1784f90a0000 pid=2809 clone guuid=07fe04f3-1a00-0000-4b8e-1784fb0a0000 pid=2811 /home/sandbox/iran.x86_64 delete-file net zombie guuid=6be4eef2-1a00-0000-4b8e-1784f90a0000 pid=2809->guuid=07fe04f3-1a00-0000-4b8e-1784fb0a0000 pid=2811 clone guuid=3516fcf2-1a00-0000-4b8e-1784fa0a0000 pid=2810->638b1b62-8ce5-542b-af3e-4880cfa097a3 send: 139B bd60e944-3fca-52e5-90da-f5195263cc27 64.89.161.81:6667 guuid=07fe04f3-1a00-0000-4b8e-1784fb0a0000 pid=2811->bd60e944-3fca-52e5-90da-f5195263cc27 con guuid=03b1ccf7-1a00-0000-4b8e-1784010b0000 pid=2817->638b1b62-8ce5-542b-af3e-4880cfa097a3 send: 88B guuid=31635904-1b00-0000-4b8e-1784190b0000 pid=2841->638b1b62-8ce5-542b-af3e-4880cfa097a3 send: 136B guuid=22ebff0b-1b00-0000-4b8e-1784290b0000 pid=2857->638b1b62-8ce5-542b-af3e-4880cfa097a3 send: 136B guuid=ff31cc13-1b00-0000-4b8e-1784440b0000 pid=2884->638b1b62-8ce5-542b-af3e-4880cfa097a3 send: 138B guuid=4792281b-1b00-0000-4b8e-17845d0b0000 pid=2909->638b1b62-8ce5-542b-af3e-4880cfa097a3 send: 139B guuid=1d7f8f22-1b00-0000-4b8e-1784770b0000 pid=2935->638b1b62-8ce5-542b-af3e-4880cfa097a3 send: 137B guuid=30205028-1b00-0000-4b8e-1784840b0000 pid=2948->638b1b62-8ce5-542b-af3e-4880cfa097a3 send: 135B guuid=d9315030-1b00-0000-4b8e-1784910b0000 pid=2961->638b1b62-8ce5-542b-af3e-4880cfa097a3 send: 135B guuid=0735ba37-1b00-0000-4b8e-17849f0b0000 pid=2975->638b1b62-8ce5-542b-af3e-4880cfa097a3 send: 136B guuid=e475be3d-1b00-0000-4b8e-1784ae0b0000 pid=2990 /home/sandbox/iran.i486 guuid=3eaa5e3d-1b00-0000-4b8e-1784ac0b0000 pid=2988->guuid=e475be3d-1b00-0000-4b8e-1784ae0b0000 pid=2990 clone guuid=7f3dd13d-1b00-0000-4b8e-1784b00b0000 pid=2992 /home/sandbox/iran.i486 delete-file net zombie guuid=e475be3d-1b00-0000-4b8e-1784ae0b0000 pid=2990->guuid=7f3dd13d-1b00-0000-4b8e-1784b00b0000 pid=2992 clone guuid=bf1bc93d-1b00-0000-4b8e-1784af0b0000 pid=2991->638b1b62-8ce5-542b-af3e-4880cfa097a3 send: 138B guuid=7f3dd13d-1b00-0000-4b8e-1784b00b0000 pid=2992->bd60e944-3fca-52e5-90da-f5195263cc27 con guuid=7d0bb147-1b00-0000-4b8e-1784c00b0000 pid=3008->638b1b62-8ce5-542b-af3e-4880cfa097a3 send: 138B guuid=0f6a564f-1b00-0000-4b8e-1784cf0b0000 pid=3023->638b1b62-8ce5-542b-af3e-4880cfa097a3 send: 138B guuid=3d856957-1b00-0000-4b8e-1784e80b0000 pid=3048->638b1b62-8ce5-542b-af3e-4880cfa097a3 send: 138B
Threat name:
Document-HTML.Trojan.Vigorf
Status:
Malicious
First seen:
2026-02-01 20:42:12 UTC
File Type:
Text (Shell)
AV detection:
15 of 36 (41.67%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
antivm defense_evasion discovery linux upx
Behaviour
Reads runtime system information
System Network Configuration Discovery
Writes file to tmp directory
Changes its process name
Checks CPU configuration
UPX packed file
Enumerates running processes
File and Directory Permissions Modification
Deletes itself
Executes dropped EXE
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:MAL_Linux_IoT_MultiArch_BotnetLoader_Generic
Author:Anish Bogati
Description:Technique-based detection of IoT/Linux botnet loader shell scripts downloading binaries from numeric IPs, chmodding, and executing multi-architecture payloads
Reference:MalwareBazaar sample lilin.sh

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh 50eb5a50663c0bf0014577b2abe1baff453aebc6a109aa7c283dbbbf20f7998f

(this sample)

  
Delivery method
Distributed via web download

Comments