MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 51ef2f3d2db2a1bc9c8b488886eebd34cd0cb84081fb370f6cc32cd9bb8652aa. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 8


Intelligence 8 IOCs YARA 1 File information Comments

SHA256 hash: 51ef2f3d2db2a1bc9c8b488886eebd34cd0cb84081fb370f6cc32cd9bb8652aa
SHA3-384 hash: f63d2d3721c5a1045cb9457cd16fda9fc995064fc86bf60326599a71c8c6cb572243e755eb3b30057779870bb1011391
SHA1 hash: 94817690c6cebcbb8445142592246e869fc5832c
MD5 hash: cc205d3d9ec77499d13e8f87108748dd
humanhash: cup-early-lithium-november
File name:1.sh
Download: download sample
Signature Mirai
File size:6'359 bytes
First seen:2025-10-08 18:24:55 UTC
Last seen:Never
File type: sh
MIME type:text/x-shellscript
ssdeep 192:b63mB4bOBq/sp83SnC12TZk7sVtgnABCPOZQCPOZQFofIJINwD2DGpi3JUr8FEx8:b63mB4bOBq/sp83SnC12TZk7sVtgnAB+
TLSH T18DD14DF2B4C6527CDE9FCC3A6110296D1085B99B268B0D69D7ED346A7C89FCC1C059C7
Magika shell
Reporter abuse_ch
Tags:mirai sh
URLMalware sample (SHA256 hash)SignatureTags
http://37.114.37.177/001010101010010110101011101010101101010111010101/nwfaiehg4ewijfgriehgirehaughrarg.x862bfcd1948e365c11fd94b66f632d64614bacff62369d713c3e97a679a0e1eebe Miraimirai opendir
http://37.114.37.177/001010101010010110101011101010101101010111010101/nwfaiehg4ewijfgriehgirehaughrarg.mips4c37f74b1307ffcc0304bb68732733a69b44896a0e2ea4bddcee38d4d0ac73c7 Miraimirai opendir
http://37.114.37.177/001010101010010110101011101010101101010111010101/nwfaiehg4ewijfgriehgirehaughrarg.arc2c49a3764776ae65401b8808a2c751095bf3141a656e60bbf000fe302685e40f Miraimirai opendir
http://37.114.37.177/001010101010010110101011101010101101010111010101/nwfaiehg4ewijfgriehgirehaughrarg.i468n/an/aelf ua-wget
http://37.114.37.177/001010101010010110101011101010101101010111010101/nwfaiehg4ewijfgriehgirehaughrarg.i68639992e29ffaf78366e2665bbcd2e1a3cd8102ab10456c30c2b349a6f0a1aaeb4 Miraimirai opendir
http://37.114.37.177/001010101010010110101011101010101101010111010101/nwfaiehg4ewijfgriehgirehaughrarg.x86_64fa37b5d33017729834bd5eeed98ae45c77c135847ed8a89e833f8d8552e3b850 Miraimirai opendir
http://37.114.37.177/001010101010010110101011101010101101010111010101/nwfaiehg4ewijfgriehgirehaughrarg.mpslb1a023a05e2ace5da42cdea0edfee5673aa40f4a1489a3e2fdd9a8bc754f1a45 Miraimirai opendir
http://37.114.37.177/001010101010010110101011101010101101010111010101/nwfaiehg4ewijfgriehgirehaughrarg.armf2b6be659f7e4b6692055214bb853a684099779de0589c0af40931d9f61138c5 Miraimirai opendir
http://37.114.37.177/001010101010010110101011101010101101010111010101/nwfaiehg4ewijfgriehgirehaughrarg.arm5c785b6c753fba8b29e9f7bdb9d3d4876c133bc6276aef67a6644e32b1164508b Miraimirai opendir
http://37.114.37.177/001010101010010110101011101010101101010111010101/nwfaiehg4ewijfgriehgirehaughrarg.arm6936bb197bc13fe9ee5f38666e54dc57a4811b0cd96659f42addbd2763f6b0826 Miraimirai opendir
http://37.114.37.177/001010101010010110101011101010101101010111010101/nwfaiehg4ewijfgriehgirehaughrarg.arm770628353e70155e6b5ae25249f785a5b2a00292162602dbfcadc0914018cf1df Miraimirai opendir
http://37.114.37.177/001010101010010110101011101010101101010111010101/nwfaiehg4ewijfgriehgirehaughrarg.ppcbc7fcb56b9262e76084771fb4c4a85809fb3aeeae1af447a2b40e0f779073473 Miraimirai opendir
http://37.114.37.177/001010101010010110101011101010101101010111010101/nwfaiehg4ewijfgriehgirehaughrarg.spcd17cdca899367cb8299dba76d76c3d6a7f40f86d380601de044683faedac97b7 Miraimirai opendir
http://37.114.37.177/001010101010010110101011101010101101010111010101/nwfaiehg4ewijfgriehgirehaughrarg.m68kccfca5829c29d23db941f651e0a67c604039d2ec9dae60f1bc9381fb83ee54d8 Miraimirai opendir
http://37.114.37.177/001010101010010110101011101010101101010111010101/nwfaiehg4ewijfgriehgirehaughrarg.sh468a3ee815679124ca02d40056a4e238787020a5bef91f34466dbb5152546e764 Miraimirai opendir

Intelligence


File Origin
# of uploads :
1
# of downloads :
32
Origin country :
DE DE
Vendor Threat Intelligence
Verdict:
Malicious
File Type:
unix shell
First seen:
2025-10-05T19:15:00Z UTC
Last seen:
2025-10-05T19:38:00Z UTC
Hits:
~10
Threat name:
Script-Shell.Downloader.Heuristic
Status:
Malicious
First seen:
2025-10-06 00:14:03 UTC
File Type:
Text (Shell)
AV detection:
18 of 36 (50.00%)
Threat level:
  2/5
Result
Malware family:
Score:
  10/10
Tags:
family:mirai antivm botnet defense_evasion discovery linux upx
Behaviour
Reads runtime system information
System Network Configuration Discovery
Writes file to tmp directory
Changes its process name
Checks CPU configuration
UPX packed file
Deletes log files
Enumerates running processes
File and Directory Permissions Modification
Deletes Audit logs
Deletes journal logs
Deletes system logs
Executes dropped EXE
Mirai
Mirai family
Malware Config
C2 Extraction:
formaboyasdfa.redirectme.net
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Linux_Shellscript_Downloader
Author:albertzsigovits
Description:Generic Approach to Shellscript downloaders

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh 51ef2f3d2db2a1bc9c8b488886eebd34cd0cb84081fb370f6cc32cd9bb8652aa

(this sample)

  
Delivery method
Distributed via web download

Comments