MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 54366313d83d10fa5ba4bcee85bf17d88ac252f688e51fcab8d034cdd0072ec5. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: 54366313d83d10fa5ba4bcee85bf17d88ac252f688e51fcab8d034cdd0072ec5
SHA3-384 hash: 11533ab5b5ae2df9026fab118bb8e4001d767e138dbb5d0a472b464968f0a5b7f4c7a85787578bfeaef3b0f0ef6cb943
SHA1 hash: d35d39772667b6e831aff9530bad3328bda04418
MD5 hash: b2117623645ebe4cc864816fc5171883
humanhash: butter-hamper-glucose-pasta
File name:wget.sh
Download: download sample
Signature Mirai
File size:834 bytes
First seen:2025-08-25 07:39:27 UTC
Last seen:Never
File type: sh
MIME type:text/plain
ssdeep 24:hiUYq9NI7NFKdI+IhtjAvT5mIlZ5ts2Zbqnn:hiUYqoNF01IhtM75m0s2ZOn
TLSH T1980103DF663163678A888D6470658585B067D1C072FC0F9ADDC514F2D9E5700332FF69
Magika asm
Reporter abuse_ch
Tags:mirai sh
URLMalware sample (SHA256 hash)SignatureTags
http://147.93.177.149/systemcl/arma2812bf91c1836b0749615f8c92f49b055ed1152a0cfcb03cffb4473388ae1f9 Miraielf mirai
http://147.93.177.149/systemcl/arm5467ca3ecdb388a31f9687f3f93134ae992fbfbe2936cfbd700c3d198b3b65ecb Miraielf mirai
http://147.93.177.149/systemcl/arm67a4627901da5e02ceacaf688cc103b4944a3cf75b4f1f4316ee638893eaa4104 Miraielf mirai
http://147.93.177.149/systemcl/arm71745a1dc09e108e719186017f4d6f10e1835aa4ba3f74b50b8394e3268c66524 Miraielf mirai
http://147.93.177.149/systemcl/m68k19abfca0200531ee5ddc2dd7bc4454af84d9ffe0ef2e12cd2a54fc828ebdc659 Miraielf mirai
http://147.93.177.149/systemcl/mipsad42066092b60784e1579fb3742cf3a41450dacc13b254e9c3a0c5b84aaf0db4 Miraielf mirai
http://147.93.177.149/systemcl/mpsl7365564e3fc5bc60caa91eb8b6b87a6d8da423389be87134899fcd0caaeb3242 Miraielf mirai
http://147.93.177.149/systemcl/ppcabfd19ac36a02a8d3552a65a6e023b7499af427f7ea558cbc5064b8475bd955e Miraielf mirai
http://147.93.177.149/systemcl/sh4b5d5a320320766751e9a1e31bc6ff850196e0c3f0b5baee15eee600b8a3cdae2 Miraielf mirai
http://147.93.177.149/systemcl/spc2b4e44a8a37c63ce0a2c007bb22d903ae9d13b643b6b556f4d15199926cdd54c Miraielf mirai
http://147.93.177.149/systemcl/x862e9b4bb064c078485eab38389da45cfecd1f865d77cd5c199ae3c2fe195daf72 Miraielf mirai
http://147.93.177.149/systemcl/x86_6447a0fa2b9aa3ebdb48324d5ad43903187a528176193716db81991191b3d3b230 Miraielf mirai

Intelligence


File Origin
# of uploads :
1
# of downloads :
30
Origin country :
DE DE
Vendor Threat Intelligence
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
evasive
Verdict:
Malicious
File Type:
text
First seen:
2025-08-24T17:34:00Z UTC
Last seen:
2025-08-24T17:34:00Z UTC
Hits:
~10
Status:
terminated
Behavior Graph:
%3 guuid=95f1a203-1700-0000-1a16-a9bda10c0000 pid=3233 /usr/bin/sudo guuid=5eee3906-1700-0000-1a16-a9bda60c0000 pid=3238 /tmp/sample.bin guuid=95f1a203-1700-0000-1a16-a9bda10c0000 pid=3233->guuid=5eee3906-1700-0000-1a16-a9bda60c0000 pid=3238 execve guuid=b2d27d06-1700-0000-1a16-a9bda80c0000 pid=3240 /usr/bin/wget net send-data write-file guuid=5eee3906-1700-0000-1a16-a9bda60c0000 pid=3238->guuid=b2d27d06-1700-0000-1a16-a9bda80c0000 pid=3240 execve guuid=654b7f18-1700-0000-1a16-a9bdcc0c0000 pid=3276 /usr/bin/chmod guuid=5eee3906-1700-0000-1a16-a9bda60c0000 pid=3238->guuid=654b7f18-1700-0000-1a16-a9bdcc0c0000 pid=3276 execve guuid=e067cd18-1700-0000-1a16-a9bdcd0c0000 pid=3277 /usr/bin/dash guuid=5eee3906-1700-0000-1a16-a9bda60c0000 pid=3238->guuid=e067cd18-1700-0000-1a16-a9bdcd0c0000 pid=3277 clone guuid=5cca7019-1700-0000-1a16-a9bdd10c0000 pid=3281 /usr/bin/wget net send-data write-file guuid=5eee3906-1700-0000-1a16-a9bda60c0000 pid=3238->guuid=5cca7019-1700-0000-1a16-a9bdd10c0000 pid=3281 execve guuid=0a6e7f2c-1700-0000-1a16-a9bd010d0000 pid=3329 /usr/bin/chmod guuid=5eee3906-1700-0000-1a16-a9bda60c0000 pid=3238->guuid=0a6e7f2c-1700-0000-1a16-a9bd010d0000 pid=3329 execve guuid=4e5bc82c-1700-0000-1a16-a9bd030d0000 pid=3331 /usr/bin/dash guuid=5eee3906-1700-0000-1a16-a9bda60c0000 pid=3238->guuid=4e5bc82c-1700-0000-1a16-a9bd030d0000 pid=3331 clone guuid=4d37382d-1700-0000-1a16-a9bd060d0000 pid=3334 /usr/bin/wget net send-data write-file guuid=5eee3906-1700-0000-1a16-a9bda60c0000 pid=3238->guuid=4d37382d-1700-0000-1a16-a9bd060d0000 pid=3334 execve guuid=f15ace43-1700-0000-1a16-a9bd330d0000 pid=3379 /usr/bin/chmod guuid=5eee3906-1700-0000-1a16-a9bda60c0000 pid=3238->guuid=f15ace43-1700-0000-1a16-a9bd330d0000 pid=3379 execve guuid=d4074644-1700-0000-1a16-a9bd350d0000 pid=3381 /usr/bin/dash guuid=5eee3906-1700-0000-1a16-a9bda60c0000 pid=3238->guuid=d4074644-1700-0000-1a16-a9bd350d0000 pid=3381 clone guuid=277a4e45-1700-0000-1a16-a9bd390d0000 pid=3385 /usr/bin/wget net send-data write-file guuid=5eee3906-1700-0000-1a16-a9bda60c0000 pid=3238->guuid=277a4e45-1700-0000-1a16-a9bd390d0000 pid=3385 execve guuid=18b7b95c-1700-0000-1a16-a9bd640d0000 pid=3428 /usr/bin/chmod guuid=5eee3906-1700-0000-1a16-a9bda60c0000 pid=3238->guuid=18b7b95c-1700-0000-1a16-a9bd640d0000 pid=3428 execve guuid=7d68315d-1700-0000-1a16-a9bd660d0000 pid=3430 /usr/bin/dash guuid=5eee3906-1700-0000-1a16-a9bda60c0000 pid=3238->guuid=7d68315d-1700-0000-1a16-a9bd660d0000 pid=3430 clone guuid=ec6c385e-1700-0000-1a16-a9bd6a0d0000 pid=3434 /usr/bin/wget net send-data write-file guuid=5eee3906-1700-0000-1a16-a9bda60c0000 pid=3238->guuid=ec6c385e-1700-0000-1a16-a9bd6a0d0000 pid=3434 execve guuid=6017b275-1700-0000-1a16-a9bd950d0000 pid=3477 /usr/bin/chmod guuid=5eee3906-1700-0000-1a16-a9bda60c0000 pid=3238->guuid=6017b275-1700-0000-1a16-a9bd950d0000 pid=3477 execve guuid=1db53076-1700-0000-1a16-a9bd970d0000 pid=3479 /usr/bin/dash guuid=5eee3906-1700-0000-1a16-a9bda60c0000 pid=3238->guuid=1db53076-1700-0000-1a16-a9bd970d0000 pid=3479 clone guuid=45081e77-1700-0000-1a16-a9bd9a0d0000 pid=3482 /usr/bin/wget net send-data write-file guuid=5eee3906-1700-0000-1a16-a9bda60c0000 pid=3238->guuid=45081e77-1700-0000-1a16-a9bd9a0d0000 pid=3482 execve guuid=1119b490-1700-0000-1a16-a9bdd10d0000 pid=3537 /usr/bin/chmod guuid=5eee3906-1700-0000-1a16-a9bda60c0000 pid=3238->guuid=1119b490-1700-0000-1a16-a9bdd10d0000 pid=3537 execve guuid=65e5ec90-1700-0000-1a16-a9bdd20d0000 pid=3538 /usr/bin/dash guuid=5eee3906-1700-0000-1a16-a9bda60c0000 pid=3238->guuid=65e5ec90-1700-0000-1a16-a9bdd20d0000 pid=3538 clone guuid=cbea6091-1700-0000-1a16-a9bdd60d0000 pid=3542 /usr/bin/wget net send-data write-file guuid=5eee3906-1700-0000-1a16-a9bda60c0000 pid=3238->guuid=cbea6091-1700-0000-1a16-a9bdd60d0000 pid=3542 execve guuid=2cb40aa8-1700-0000-1a16-a9bd1f0e0000 pid=3615 /usr/bin/chmod guuid=5eee3906-1700-0000-1a16-a9bda60c0000 pid=3238->guuid=2cb40aa8-1700-0000-1a16-a9bd1f0e0000 pid=3615 execve guuid=47a678a8-1700-0000-1a16-a9bd210e0000 pid=3617 /usr/bin/dash guuid=5eee3906-1700-0000-1a16-a9bda60c0000 pid=3238->guuid=47a678a8-1700-0000-1a16-a9bd210e0000 pid=3617 clone guuid=535236a9-1700-0000-1a16-a9bd250e0000 pid=3621 /usr/bin/wget net send-data write-file guuid=5eee3906-1700-0000-1a16-a9bda60c0000 pid=3238->guuid=535236a9-1700-0000-1a16-a9bd250e0000 pid=3621 execve guuid=e38573bc-1700-0000-1a16-a9bd520e0000 pid=3666 /usr/bin/chmod guuid=5eee3906-1700-0000-1a16-a9bda60c0000 pid=3238->guuid=e38573bc-1700-0000-1a16-a9bd520e0000 pid=3666 execve guuid=0faed4bc-1700-0000-1a16-a9bd530e0000 pid=3667 /usr/bin/dash guuid=5eee3906-1700-0000-1a16-a9bda60c0000 pid=3238->guuid=0faed4bc-1700-0000-1a16-a9bd530e0000 pid=3667 clone guuid=e1c790bd-1700-0000-1a16-a9bd580e0000 pid=3672 /usr/bin/wget net send-data write-file guuid=5eee3906-1700-0000-1a16-a9bda60c0000 pid=3238->guuid=e1c790bd-1700-0000-1a16-a9bd580e0000 pid=3672 execve guuid=54153ad8-1700-0000-1a16-a9bd9a0e0000 pid=3738 /usr/bin/chmod guuid=5eee3906-1700-0000-1a16-a9bda60c0000 pid=3238->guuid=54153ad8-1700-0000-1a16-a9bd9a0e0000 pid=3738 execve guuid=f83c71d8-1700-0000-1a16-a9bd9c0e0000 pid=3740 /usr/bin/dash guuid=5eee3906-1700-0000-1a16-a9bda60c0000 pid=3238->guuid=f83c71d8-1700-0000-1a16-a9bd9c0e0000 pid=3740 clone guuid=9e4952d9-1700-0000-1a16-a9bda10e0000 pid=3745 /usr/bin/wget net send-data write-file guuid=5eee3906-1700-0000-1a16-a9bda60c0000 pid=3238->guuid=9e4952d9-1700-0000-1a16-a9bda10e0000 pid=3745 execve guuid=8af12ef0-1700-0000-1a16-a9bd020f0000 pid=3842 /usr/bin/chmod guuid=5eee3906-1700-0000-1a16-a9bda60c0000 pid=3238->guuid=8af12ef0-1700-0000-1a16-a9bd020f0000 pid=3842 execve guuid=8d4d75f0-1700-0000-1a16-a9bd030f0000 pid=3843 /usr/bin/dash guuid=5eee3906-1700-0000-1a16-a9bda60c0000 pid=3238->guuid=8d4d75f0-1700-0000-1a16-a9bd030f0000 pid=3843 clone guuid=2e27fff1-1700-0000-1a16-a9bd050f0000 pid=3845 /usr/bin/wget net send-data write-file guuid=5eee3906-1700-0000-1a16-a9bda60c0000 pid=3238->guuid=2e27fff1-1700-0000-1a16-a9bd050f0000 pid=3845 execve guuid=3fcf3503-1800-0000-1a16-a9bd320f0000 pid=3890 /usr/bin/chmod guuid=5eee3906-1700-0000-1a16-a9bda60c0000 pid=3238->guuid=3fcf3503-1800-0000-1a16-a9bd320f0000 pid=3890 execve guuid=59339e03-1800-0000-1a16-a9bd340f0000 pid=3892 /home/sandbox/x86 net guuid=5eee3906-1700-0000-1a16-a9bda60c0000 pid=3238->guuid=59339e03-1800-0000-1a16-a9bd340f0000 pid=3892 execve guuid=12907013-1800-0000-1a16-a9bd780f0000 pid=3960 /usr/bin/wget net send-data write-file guuid=5eee3906-1700-0000-1a16-a9bda60c0000 pid=3238->guuid=12907013-1800-0000-1a16-a9bd780f0000 pid=3960 execve guuid=0da91030-1800-0000-1a16-a9bdc50f0000 pid=4037 /usr/bin/chmod guuid=5eee3906-1700-0000-1a16-a9bda60c0000 pid=3238->guuid=0da91030-1800-0000-1a16-a9bdc50f0000 pid=4037 execve guuid=fc7b7d30-1800-0000-1a16-a9bdc70f0000 pid=4039 /usr/bin/dash guuid=5eee3906-1700-0000-1a16-a9bda60c0000 pid=3238->guuid=fc7b7d30-1800-0000-1a16-a9bdc70f0000 pid=4039 clone guuid=20f69d32-1800-0000-1a16-a9bdcf0f0000 pid=4047 /usr/bin/rm delete-file guuid=5eee3906-1700-0000-1a16-a9bda60c0000 pid=3238->guuid=20f69d32-1800-0000-1a16-a9bdcf0f0000 pid=4047 execve 10cefe15-d706-5ce1-8934-2f4cef63f93d 147.93.177.149:80 guuid=b2d27d06-1700-0000-1a16-a9bda80c0000 pid=3240->10cefe15-d706-5ce1-8934-2f4cef63f93d send: 141B guuid=5cca7019-1700-0000-1a16-a9bdd10c0000 pid=3281->10cefe15-d706-5ce1-8934-2f4cef63f93d send: 142B guuid=4d37382d-1700-0000-1a16-a9bd060d0000 pid=3334->10cefe15-d706-5ce1-8934-2f4cef63f93d send: 142B guuid=277a4e45-1700-0000-1a16-a9bd390d0000 pid=3385->10cefe15-d706-5ce1-8934-2f4cef63f93d send: 142B guuid=ec6c385e-1700-0000-1a16-a9bd6a0d0000 pid=3434->10cefe15-d706-5ce1-8934-2f4cef63f93d send: 142B guuid=45081e77-1700-0000-1a16-a9bd9a0d0000 pid=3482->10cefe15-d706-5ce1-8934-2f4cef63f93d send: 142B guuid=cbea6091-1700-0000-1a16-a9bdd60d0000 pid=3542->10cefe15-d706-5ce1-8934-2f4cef63f93d send: 142B guuid=535236a9-1700-0000-1a16-a9bd250e0000 pid=3621->10cefe15-d706-5ce1-8934-2f4cef63f93d send: 141B guuid=e1c790bd-1700-0000-1a16-a9bd580e0000 pid=3672->10cefe15-d706-5ce1-8934-2f4cef63f93d send: 141B guuid=9e4952d9-1700-0000-1a16-a9bda10e0000 pid=3745->10cefe15-d706-5ce1-8934-2f4cef63f93d send: 141B guuid=2e27fff1-1700-0000-1a16-a9bd050f0000 pid=3845->10cefe15-d706-5ce1-8934-2f4cef63f93d send: 141B 8b0a01dc-0728-52c1-8024-c4ba7801b8d6 8.8.8.8:53 guuid=59339e03-1800-0000-1a16-a9bd340f0000 pid=3892->8b0a01dc-0728-52c1-8024-c4ba7801b8d6 con guuid=2bb16613-1800-0000-1a16-a9bd750f0000 pid=3957 /home/sandbox/x86 guuid=59339e03-1800-0000-1a16-a9bd340f0000 pid=3892->guuid=2bb16613-1800-0000-1a16-a9bd750f0000 pid=3957 clone guuid=ee816b13-1800-0000-1a16-a9bd770f0000 pid=3959 /home/sandbox/x86 net send-data zombie guuid=59339e03-1800-0000-1a16-a9bd340f0000 pid=3892->guuid=ee816b13-1800-0000-1a16-a9bd770f0000 pid=3959 clone guuid=ee816b13-1800-0000-1a16-a9bd770f0000 pid=3959->8b0a01dc-0728-52c1-8024-c4ba7801b8d6 con dfbb6132-9b3a-5fcc-ae73-0a5bea22ee6b 87.121.84.220:61459 guuid=ee816b13-1800-0000-1a16-a9bd770f0000 pid=3959->dfbb6132-9b3a-5fcc-ae73-0a5bea22ee6b send: 43B guuid=12907013-1800-0000-1a16-a9bd780f0000 pid=3960->10cefe15-d706-5ce1-8934-2f4cef63f93d send: 144B
Threat name:
Linux.Trojan.Alevaul
Status:
Malicious
First seen:
2025-08-24 23:03:20 UTC
File Type:
Text (Shell)
AV detection:
20 of 37 (54.05%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Modifies registry class
Suspicious use of SetWindowsHookEx
Enumerates physical storage devices
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh 54366313d83d10fa5ba4bcee85bf17d88ac252f688e51fcab8d034cdd0072ec5

(this sample)

  
Delivery method
Distributed via web download

Comments