MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 5a3d3bf4ad8238891541260ede79eaaefd979a46403bcb5e345ca22780da325f. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: 5a3d3bf4ad8238891541260ede79eaaefd979a46403bcb5e345ca22780da325f
SHA3-384 hash: 43775ed43b51cebd004e37f4be175230ef60043075a6497b134316db62008d8b854f40456a4a5f3175387314e7005b5f
SHA1 hash: bf8352067aef2068f431b79998d5f6d8daa75b80
MD5 hash: c65b79d82832842acf9ef18d1cad71cd
humanhash: early-november-hamper-ten
File name:lil
Download: download sample
Signature Mirai
File size:833 bytes
First seen:2025-09-23 04:50:58 UTC
Last seen:Never
File type: sh
MIME type:text/plain
ssdeep 12:pavZIGDNk/P/HDNk/P1l1hDNk/PYIjIYIMDNk/P/I4DNk/P/HDNk/v:pmZLk/xk/tPXk/g6nk/Xfk/hk/v
TLSH T16D0112FF518DD4900E598B4D79D3C92DA10189D331C4EE4BA86E0D32BD84A5DF499F9C
Magika txt
Reporter abuse_ch
Tags:mirai sh
URLMalware sample (SHA256 hash)SignatureTags
http://160.250.134.61/lmips8e8239ebc8b41e0cb7f7452f6293f5a5dd4d2f7bd706df0f9e399413e8df328b Gafgytelf gafgyt
http://160.250.134.61/lmpslaea8ad044799f08ef2a9d6bf1617de28d4669ba1fea99f308550af3c87b70349 Gafgytelf gafgyt
http://160.250.134.61/arm86c913791bb43de279ba0ecacbe54a5ba85bfbc96a23824ff9c6fd6644f7def7 Miraiarm elf geofenced mirai ua-wget USA
http://160.250.134.61/arm50841551fe33de70d71ebe9a6b62bc95ab0b532eff3e22b642d1d070055f45c3c Miraiarm elf geofenced mirai ua-wget USA
http://160.250.134.61/arm7dd42fda90826e3f259b46e9817c9449571a35a4fe6a067440adc8051c250dfa5 Miraiarm elf geofenced mirai ua-wget USA
http://160.250.134.61/arm6bcc19143fe5857be60de591ccb65fdae6fb810b473440d0c38d8fcea9afddd5c Miraielf mirai ua-wget

Intelligence


File Origin
# of uploads :
1
# of downloads :
43
Origin country :
DE DE
Vendor Threat Intelligence
Verdict:
Malicious
File Type:
text
First seen:
2025-09-23T02:58:00Z UTC
Last seen:
2025-09-23T02:58:00Z UTC
Hits:
~10
Detections:
HEUR:Trojan-Downloader.Shell.Agent.p HEUR:Trojan-Downloader.Shell.Agent.a
Status:
terminated
Behavior Graph:
%3 guuid=c28f1d51-1900-0000-0a8c-0327c70c0000 pid=3271 /usr/bin/sudo guuid=01a5d254-1900-0000-0a8c-0327d00c0000 pid=3280 /tmp/sample.bin guuid=c28f1d51-1900-0000-0a8c-0327c70c0000 pid=3271->guuid=01a5d254-1900-0000-0a8c-0327d00c0000 pid=3280 execve guuid=0b182155-1900-0000-0a8c-0327d20c0000 pid=3282 /usr/bin/cp guuid=01a5d254-1900-0000-0a8c-0327d00c0000 pid=3280->guuid=0b182155-1900-0000-0a8c-0327d20c0000 pid=3282 execve guuid=bc81405c-1900-0000-0a8c-0327e40c0000 pid=3300 /usr/bin/dash guuid=01a5d254-1900-0000-0a8c-0327d00c0000 pid=3280->guuid=bc81405c-1900-0000-0a8c-0327e40c0000 pid=3300 clone guuid=07633999-1900-0000-0a8c-03276b0d0000 pid=3435 /usr/bin/chmod guuid=01a5d254-1900-0000-0a8c-0327d00c0000 pid=3280->guuid=07633999-1900-0000-0a8c-03276b0d0000 pid=3435 execve guuid=c51e9b99-1900-0000-0a8c-03276d0d0000 pid=3437 /usr/bin/dash guuid=01a5d254-1900-0000-0a8c-0327d00c0000 pid=3280->guuid=c51e9b99-1900-0000-0a8c-03276d0d0000 pid=3437 clone guuid=f8e4779a-1900-0000-0a8c-0327720d0000 pid=3442 /usr/bin/rm delete-file guuid=01a5d254-1900-0000-0a8c-0327d00c0000 pid=3280->guuid=f8e4779a-1900-0000-0a8c-0327720d0000 pid=3442 execve guuid=41aafc9a-1900-0000-0a8c-0327740d0000 pid=3444 /usr/bin/dash guuid=01a5d254-1900-0000-0a8c-0327d00c0000 pid=3280->guuid=41aafc9a-1900-0000-0a8c-0327740d0000 pid=3444 clone guuid=87b3f2d8-1900-0000-0a8c-0327ef0d0000 pid=3567 /usr/bin/chmod guuid=01a5d254-1900-0000-0a8c-0327d00c0000 pid=3280->guuid=87b3f2d8-1900-0000-0a8c-0327ef0d0000 pid=3567 execve guuid=5d9d2dd9-1900-0000-0a8c-0327f00d0000 pid=3568 /usr/bin/dash guuid=01a5d254-1900-0000-0a8c-0327d00c0000 pid=3280->guuid=5d9d2dd9-1900-0000-0a8c-0327f00d0000 pid=3568 clone guuid=d35728da-1900-0000-0a8c-0327f30d0000 pid=3571 /usr/bin/rm delete-file guuid=01a5d254-1900-0000-0a8c-0327d00c0000 pid=3280->guuid=d35728da-1900-0000-0a8c-0327f30d0000 pid=3571 execve guuid=ef5765da-1900-0000-0a8c-0327f40d0000 pid=3572 /usr/bin/dash guuid=01a5d254-1900-0000-0a8c-0327d00c0000 pid=3280->guuid=ef5765da-1900-0000-0a8c-0327f40d0000 pid=3572 clone guuid=4f984415-1a00-0000-0a8c-0327620e0000 pid=3682 /usr/bin/chmod guuid=01a5d254-1900-0000-0a8c-0327d00c0000 pid=3280->guuid=4f984415-1a00-0000-0a8c-0327620e0000 pid=3682 execve guuid=b5bfb115-1a00-0000-0a8c-0327630e0000 pid=3683 /usr/bin/dash guuid=01a5d254-1900-0000-0a8c-0327d00c0000 pid=3280->guuid=b5bfb115-1a00-0000-0a8c-0327630e0000 pid=3683 clone guuid=b8c07c18-1a00-0000-0a8c-0327680e0000 pid=3688 /usr/bin/rm delete-file guuid=01a5d254-1900-0000-0a8c-0327d00c0000 pid=3280->guuid=b8c07c18-1a00-0000-0a8c-0327680e0000 pid=3688 execve guuid=63bdee18-1a00-0000-0a8c-0327690e0000 pid=3689 /usr/bin/dash guuid=01a5d254-1900-0000-0a8c-0327d00c0000 pid=3280->guuid=63bdee18-1a00-0000-0a8c-0327690e0000 pid=3689 clone guuid=87909b55-1a00-0000-0a8c-0327730e0000 pid=3699 /usr/bin/chmod guuid=01a5d254-1900-0000-0a8c-0327d00c0000 pid=3280->guuid=87909b55-1a00-0000-0a8c-0327730e0000 pid=3699 execve guuid=7df20856-1a00-0000-0a8c-0327750e0000 pid=3701 /usr/bin/dash guuid=01a5d254-1900-0000-0a8c-0327d00c0000 pid=3280->guuid=7df20856-1a00-0000-0a8c-0327750e0000 pid=3701 clone guuid=d8449c57-1a00-0000-0a8c-03277b0e0000 pid=3707 /usr/bin/rm delete-file guuid=01a5d254-1900-0000-0a8c-0327d00c0000 pid=3280->guuid=d8449c57-1a00-0000-0a8c-03277b0e0000 pid=3707 execve guuid=a8020658-1a00-0000-0a8c-03277d0e0000 pid=3709 /usr/bin/dash guuid=01a5d254-1900-0000-0a8c-0327d00c0000 pid=3280->guuid=a8020658-1a00-0000-0a8c-03277d0e0000 pid=3709 clone guuid=01b3839c-1a00-0000-0a8c-03276e0f0000 pid=3950 /usr/bin/chmod guuid=01a5d254-1900-0000-0a8c-0327d00c0000 pid=3280->guuid=01b3839c-1a00-0000-0a8c-03276e0f0000 pid=3950 execve guuid=ecafc19c-1a00-0000-0a8c-03276f0f0000 pid=3951 /usr/bin/dash guuid=01a5d254-1900-0000-0a8c-0327d00c0000 pid=3280->guuid=ecafc19c-1a00-0000-0a8c-03276f0f0000 pid=3951 clone guuid=dd9ee29d-1a00-0000-0a8c-0327730f0000 pid=3955 /usr/bin/rm delete-file guuid=01a5d254-1900-0000-0a8c-0327d00c0000 pid=3280->guuid=dd9ee29d-1a00-0000-0a8c-0327730f0000 pid=3955 execve guuid=cbcf209e-1a00-0000-0a8c-0327770f0000 pid=3959 /usr/bin/dash guuid=01a5d254-1900-0000-0a8c-0327d00c0000 pid=3280->guuid=cbcf209e-1a00-0000-0a8c-0327770f0000 pid=3959 clone guuid=a62ee8dc-1a00-0000-0a8c-03273f100000 pid=4159 /usr/bin/chmod guuid=01a5d254-1900-0000-0a8c-0327d00c0000 pid=3280->guuid=a62ee8dc-1a00-0000-0a8c-03273f100000 pid=4159 execve guuid=b36760dd-1a00-0000-0a8c-032741100000 pid=4161 /usr/bin/dash guuid=01a5d254-1900-0000-0a8c-0327d00c0000 pid=3280->guuid=b36760dd-1a00-0000-0a8c-032741100000 pid=4161 clone guuid=e07075df-1a00-0000-0a8c-03274a100000 pid=4170 /usr/bin/rm delete-file guuid=01a5d254-1900-0000-0a8c-0327d00c0000 pid=3280->guuid=e07075df-1a00-0000-0a8c-03274a100000 pid=4170 execve guuid=48c6d6df-1a00-0000-0a8c-03274c100000 pid=4172 /usr/bin/rm delete-file guuid=01a5d254-1900-0000-0a8c-0327d00c0000 pid=3280->guuid=48c6d6df-1a00-0000-0a8c-03274c100000 pid=4172 execve guuid=c553525c-1900-0000-0a8c-0327e50c0000 pid=3301 /usr/bin/busybox net send-data write-file guuid=bc81405c-1900-0000-0a8c-0327e40c0000 pid=3300->guuid=c553525c-1900-0000-0a8c-0327e50c0000 pid=3301 execve 0dc21e74-2c96-5836-aca6-ed80e44c888b 160.250.134.61:80 guuid=c553525c-1900-0000-0a8c-0327e50c0000 pid=3301->0dc21e74-2c96-5836-aca6-ed80e44c888b send: 82B guuid=1e7b0c9b-1900-0000-0a8c-0327750d0000 pid=3445 /usr/bin/busybox net send-data write-file guuid=41aafc9a-1900-0000-0a8c-0327740d0000 pid=3444->guuid=1e7b0c9b-1900-0000-0a8c-0327750d0000 pid=3445 execve guuid=1e7b0c9b-1900-0000-0a8c-0327750d0000 pid=3445->0dc21e74-2c96-5836-aca6-ed80e44c888b send: 82B guuid=aad471da-1900-0000-0a8c-0327f50d0000 pid=3573 /usr/bin/busybox net send-data write-file guuid=ef5765da-1900-0000-0a8c-0327f40d0000 pid=3572->guuid=aad471da-1900-0000-0a8c-0327f50d0000 pid=3573 execve guuid=aad471da-1900-0000-0a8c-0327f50d0000 pid=3573->0dc21e74-2c96-5836-aca6-ed80e44c888b send: 80B guuid=b28cff18-1a00-0000-0a8c-03276a0e0000 pid=3690 /usr/bin/busybox net send-data write-file guuid=63bdee18-1a00-0000-0a8c-0327690e0000 pid=3689->guuid=b28cff18-1a00-0000-0a8c-03276a0e0000 pid=3690 execve guuid=b28cff18-1a00-0000-0a8c-03276a0e0000 pid=3690->0dc21e74-2c96-5836-aca6-ed80e44c888b send: 81B guuid=b67f1558-1a00-0000-0a8c-03277e0e0000 pid=3710 /usr/bin/busybox net send-data write-file guuid=a8020658-1a00-0000-0a8c-03277d0e0000 pid=3709->guuid=b67f1558-1a00-0000-0a8c-03277e0e0000 pid=3710 execve guuid=b67f1558-1a00-0000-0a8c-03277e0e0000 pid=3710->0dc21e74-2c96-5836-aca6-ed80e44c888b send: 81B guuid=379b2b9e-1a00-0000-0a8c-0327780f0000 pid=3960 /usr/bin/busybox net send-data write-file guuid=cbcf209e-1a00-0000-0a8c-0327770f0000 pid=3959->guuid=379b2b9e-1a00-0000-0a8c-0327780f0000 pid=3960 execve guuid=379b2b9e-1a00-0000-0a8c-0327780f0000 pid=3960->0dc21e74-2c96-5836-aca6-ed80e44c888b send: 81B
Verdict:
Malicious
Threat:
Trojan-Downloader.Shell.Agent
Threat name:
Linux.Downloader.Generic
Status:
Suspicious
First seen:
2025-09-23 04:32:44 UTC
File Type:
Text (Shell)
AV detection:
13 of 38 (34.21%)
Threat level:
  3/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Modifies registry class
Suspicious use of SetWindowsHookEx
Enumerates physical storage devices
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh 5a3d3bf4ad8238891541260ede79eaaefd979a46403bcb5e345ca22780da325f

(this sample)

  
Delivery method
Distributed via web download

Comments