MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 54c17679f17896eb29bb02e7c44fd57af875570c1927f077f09f97a7fb53775d. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 6


Intelligence 6 IOCs YARA 1 File information Comments

SHA256 hash: 54c17679f17896eb29bb02e7c44fd57af875570c1927f077f09f97a7fb53775d
SHA3-384 hash: e98c7e5f527de9c9093036cd9a92516362a0dc0cf3d0597867a3dcd7fa94be1d116071516b71490b30086721a3169572
SHA1 hash: d8e591a48943503886810980b45d1a2caa718fab
MD5 hash: a06361c8d975b81addd0b81d26178c04
humanhash: jupiter-georgia-kansas-texas
File name:dvr.sh
Download: download sample
Signature Mirai
File size:667 bytes
First seen:2025-12-19 01:19:29 UTC
Last seen:Never
File type: sh
MIME type:text/plain
ssdeep 12:t9EUTZD+UaHWlUo+UjHWlUOzv+UOzMHWlUK5IjD+UK5IMHWlU5D+UuHWq:t9EUTZKUMWlUnU7WlUOzmUOzGWlU65UF
TLSH T1BB01F4EF006048595C94BA9F79634974700DAADFBCE54F4C948F1CB91E8FA18B415F58
Magika batch
Reporter abuse_ch
Tags:mirai sh
URLMalware sample (SHA256 hash)SignatureTags
http://185.208.158.242/mips0e1ab2890eef2d63ca248b23f71f63b0bb2654799a9147843f9a7fa197fe0818 Mirai32-bit elf mirai Mozi
http://185.208.158.242/mpslf717ada653d0adf9a0f1a7c338c9b03521fdc0d8a78356dffc7226c47588dea7 Miraielf geofenced mips mirai ua-wget USA
http://185.208.158.242/arm4n/an/aelf ua-wget
http://185.208.158.242/arm5fd853807beb17822d8654b02f8ab34feb54f60e2d844cdce29a0a4976725739c Miraiarm elf geofenced mirai ua-wget USA
http://185.208.158.242/arm7c819cd3e58864a49bd657b76cf4d8959b82e39ce99acd9e2cfd4658172aa5d64 Miraiarm elf geofenced mirai ua-wget USA

Intelligence


File Origin
# of uploads :
1
# of downloads :
53
Origin country :
DE DE
Vendor Threat Intelligence
No detections
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
busybox evasive expand lolbin mirai
Verdict:
Malicious
File Type:
text
First seen:
2025-12-18T23:37:00Z UTC
Last seen:
2025-12-18T23:59:00Z UTC
Hits:
~10
Status:
terminated
Behavior Graph:
%3 guuid=c43acd67-2000-0000-8d76-9ac87c0c0000 pid=3196 /usr/bin/sudo guuid=8391ac69-2000-0000-8d76-9ac8810c0000 pid=3201 /tmp/sample.bin guuid=c43acd67-2000-0000-8d76-9ac87c0c0000 pid=3196->guuid=8391ac69-2000-0000-8d76-9ac8810c0000 pid=3201 execve guuid=8185fe69-2000-0000-8d76-9ac8820c0000 pid=3202 /usr/bin/mkdir guuid=8391ac69-2000-0000-8d76-9ac8810c0000 pid=3201->guuid=8185fe69-2000-0000-8d76-9ac8820c0000 pid=3202 execve guuid=a223fa6a-2000-0000-8d76-9ac8840c0000 pid=3204 /usr/bin/dash guuid=8391ac69-2000-0000-8d76-9ac8810c0000 pid=3201->guuid=a223fa6a-2000-0000-8d76-9ac8840c0000 pid=3204 clone guuid=a6a3e476-2000-0000-8d76-9ac8970c0000 pid=3223 /usr/bin/chmod guuid=8391ac69-2000-0000-8d76-9ac8810c0000 pid=3201->guuid=a6a3e476-2000-0000-8d76-9ac8970c0000 pid=3223 execve guuid=de5f8877-2000-0000-8d76-9ac8980c0000 pid=3224 /usr/bin/dash guuid=8391ac69-2000-0000-8d76-9ac8810c0000 pid=3201->guuid=de5f8877-2000-0000-8d76-9ac8980c0000 pid=3224 clone guuid=da85d079-2000-0000-8d76-9ac89a0c0000 pid=3226 /usr/bin/rm delete-file guuid=8391ac69-2000-0000-8d76-9ac8810c0000 pid=3201->guuid=da85d079-2000-0000-8d76-9ac89a0c0000 pid=3226 execve guuid=721c4b7a-2000-0000-8d76-9ac89b0c0000 pid=3227 /usr/bin/dash guuid=8391ac69-2000-0000-8d76-9ac8810c0000 pid=3201->guuid=721c4b7a-2000-0000-8d76-9ac89b0c0000 pid=3227 clone guuid=4f4ffe86-2000-0000-8d76-9ac89d0c0000 pid=3229 /usr/bin/chmod guuid=8391ac69-2000-0000-8d76-9ac8810c0000 pid=3201->guuid=4f4ffe86-2000-0000-8d76-9ac89d0c0000 pid=3229 execve guuid=c784ff88-2000-0000-8d76-9ac89e0c0000 pid=3230 /usr/bin/dash guuid=8391ac69-2000-0000-8d76-9ac8810c0000 pid=3201->guuid=c784ff88-2000-0000-8d76-9ac89e0c0000 pid=3230 clone guuid=2fec728a-2000-0000-8d76-9ac8a00c0000 pid=3232 /usr/bin/rm delete-file guuid=8391ac69-2000-0000-8d76-9ac8810c0000 pid=3201->guuid=2fec728a-2000-0000-8d76-9ac8a00c0000 pid=3232 execve guuid=df9fda8a-2000-0000-8d76-9ac8a10c0000 pid=3233 /usr/bin/busybox net send-data guuid=8391ac69-2000-0000-8d76-9ac8810c0000 pid=3201->guuid=df9fda8a-2000-0000-8d76-9ac8a10c0000 pid=3233 execve guuid=03b4c592-2000-0000-8d76-9ac8a60c0000 pid=3238 /usr/bin/chmod guuid=8391ac69-2000-0000-8d76-9ac8810c0000 pid=3201->guuid=03b4c592-2000-0000-8d76-9ac8a60c0000 pid=3238 execve guuid=b7e84093-2000-0000-8d76-9ac8a80c0000 pid=3240 /tmp/.b guuid=8391ac69-2000-0000-8d76-9ac8810c0000 pid=3201->guuid=b7e84093-2000-0000-8d76-9ac8a80c0000 pid=3240 execve guuid=03eb8494-2000-0000-8d76-9ac8ac0c0000 pid=3244 /usr/bin/rm delete-file guuid=8391ac69-2000-0000-8d76-9ac8810c0000 pid=3201->guuid=03eb8494-2000-0000-8d76-9ac8ac0c0000 pid=3244 execve guuid=255afc94-2000-0000-8d76-9ac8ae0c0000 pid=3246 /usr/bin/dash guuid=8391ac69-2000-0000-8d76-9ac8810c0000 pid=3201->guuid=255afc94-2000-0000-8d76-9ac8ae0c0000 pid=3246 clone guuid=0f60319f-2000-0000-8d76-9ac8bf0c0000 pid=3263 /usr/bin/chmod guuid=8391ac69-2000-0000-8d76-9ac8810c0000 pid=3201->guuid=0f60319f-2000-0000-8d76-9ac8bf0c0000 pid=3263 execve guuid=8b3a789f-2000-0000-8d76-9ac8c00c0000 pid=3264 /usr/bin/dash guuid=8391ac69-2000-0000-8d76-9ac8810c0000 pid=3201->guuid=8b3a789f-2000-0000-8d76-9ac8c00c0000 pid=3264 clone guuid=02f376a0-2000-0000-8d76-9ac8c30c0000 pid=3267 /usr/bin/rm delete-file guuid=8391ac69-2000-0000-8d76-9ac8810c0000 pid=3201->guuid=02f376a0-2000-0000-8d76-9ac8c30c0000 pid=3267 execve guuid=232cb7a0-2000-0000-8d76-9ac8c50c0000 pid=3269 /usr/bin/dash guuid=8391ac69-2000-0000-8d76-9ac8810c0000 pid=3201->guuid=232cb7a0-2000-0000-8d76-9ac8c50c0000 pid=3269 clone guuid=466c46a8-2000-0000-8d76-9ac8d80c0000 pid=3288 /usr/bin/chmod guuid=8391ac69-2000-0000-8d76-9ac8810c0000 pid=3201->guuid=466c46a8-2000-0000-8d76-9ac8d80c0000 pid=3288 execve guuid=2bc48da8-2000-0000-8d76-9ac8da0c0000 pid=3290 /usr/bin/dash guuid=8391ac69-2000-0000-8d76-9ac8810c0000 pid=3201->guuid=2bc48da8-2000-0000-8d76-9ac8da0c0000 pid=3290 clone guuid=e0d13fa9-2000-0000-8d76-9ac8dc0c0000 pid=3292 /usr/bin/rm delete-file guuid=8391ac69-2000-0000-8d76-9ac8810c0000 pid=3201->guuid=e0d13fa9-2000-0000-8d76-9ac8dc0c0000 pid=3292 execve guuid=77640a6b-2000-0000-8d76-9ac8850c0000 pid=3205 /usr/bin/wget net send-data write-file guuid=a223fa6a-2000-0000-8d76-9ac8840c0000 pid=3204->guuid=77640a6b-2000-0000-8d76-9ac8850c0000 pid=3205 execve eb09858a-0b1f-5324-bcea-dad94e0f7bd5 185.208.158.242:80 guuid=77640a6b-2000-0000-8d76-9ac8850c0000 pid=3205->eb09858a-0b1f-5324-bcea-dad94e0f7bd5 send: 134B guuid=6fd4577a-2000-0000-8d76-9ac89c0c0000 pid=3228 /usr/bin/wget net send-data write-file guuid=721c4b7a-2000-0000-8d76-9ac89b0c0000 pid=3227->guuid=6fd4577a-2000-0000-8d76-9ac89c0c0000 pid=3228 execve guuid=6fd4577a-2000-0000-8d76-9ac89c0c0000 pid=3228->eb09858a-0b1f-5324-bcea-dad94e0f7bd5 send: 134B guuid=df9fda8a-2000-0000-8d76-9ac8a10c0000 pid=3233->eb09858a-0b1f-5324-bcea-dad94e0f7bd5 send: 82B guuid=b2d5e68a-2000-0000-8d76-9ac8a20c0000 pid=3234 /usr/bin/wget net send-data guuid=df9fda8a-2000-0000-8d76-9ac8a10c0000 pid=3233->guuid=b2d5e68a-2000-0000-8d76-9ac8a20c0000 pid=3234 execve guuid=b2d5e68a-2000-0000-8d76-9ac8a20c0000 pid=3234->eb09858a-0b1f-5324-bcea-dad94e0f7bd5 send: 134B guuid=a7e50a95-2000-0000-8d76-9ac8af0c0000 pid=3247 /usr/bin/wget net send-data write-file guuid=255afc94-2000-0000-8d76-9ac8ae0c0000 pid=3246->guuid=a7e50a95-2000-0000-8d76-9ac8af0c0000 pid=3247 execve guuid=a7e50a95-2000-0000-8d76-9ac8af0c0000 pid=3247->eb09858a-0b1f-5324-bcea-dad94e0f7bd5 send: 134B guuid=221ec1a0-2000-0000-8d76-9ac8c60c0000 pid=3270 /usr/bin/wget net send-data write-file guuid=232cb7a0-2000-0000-8d76-9ac8c50c0000 pid=3269->guuid=221ec1a0-2000-0000-8d76-9ac8c60c0000 pid=3270 execve guuid=221ec1a0-2000-0000-8d76-9ac8c60c0000 pid=3270->eb09858a-0b1f-5324-bcea-dad94e0f7bd5 send: 134B
Threat name:
Linux.Trojan.Generic
Status:
Suspicious
First seen:
2025-12-19 01:20:32 UTC
File Type:
Text (Shell)
AV detection:
12 of 24 (50.00%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Modifies registry class
Suspicious use of SetWindowsHookEx
Enumerates physical storage devices
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:ach_202412_suspect_bash_script
Author:abuse.ch
Description:Detects suspicious Linux bash scripts

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh 54c17679f17896eb29bb02e7c44fd57af875570c1927f077f09f97a7fb53775d

(this sample)

  
Delivery method
Distributed via web download

Comments