MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 5c84dacbfcf285720234d6f2d6e379de0f1efeda7fd327f3cd55cf91077f4dd9. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 8


Intelligence 8 IOCs YARA 1 File information Comments

SHA256 hash: 5c84dacbfcf285720234d6f2d6e379de0f1efeda7fd327f3cd55cf91077f4dd9
SHA3-384 hash: 4f7cd7dc43d9aeed84e60d6903ebf4585b0a937ceb5f48c4dd51a0f66322a9d121b17abfb1b37dbe03ae3dc3bcf8469b
SHA1 hash: 47fa350433dbb06a86dffeb830e581665325151c
MD5 hash: b23b6bc6152425af239d5456182fe20b
humanhash: december-magnesium-fourteen-colorado
File name:Fantazy.sh
Download: download sample
Signature Mirai
File size:3'520 bytes
First seen:2025-12-09 06:17:17 UTC
Last seen:2025-12-09 15:13:48 UTC
File type: sh
MIME type:text/x-shellscript
ssdeep 12:q0FdNjd0FdMjkp+0FdMijM4qO0FdwIjwDF80FdwxLjwxEqi0Fdwhijwhhq0Fdw7L:vehJ2bHWN3QdtvGa/auQRqe7J9P3
TLSH T13D7162C91191B275AEA1C75265F649CAB2EAF4D1F1C41E0781E83CFB904DD07AA60EE2
TrID 70.0% (.SH) Linux/UNIX shell script (7000/1)
30.0% (.) Unix-like shebang (var.3) (gen) (3000/1)
Magika shell
Reporter abuse_ch
Tags:sh
URLMalware sample (SHA256 hash)SignatureTags
http://82.117.87.188/Fantazy/Fantazy.x86fb4edc4e8dbe31133b57d66f624ec9fb5de63a19d15b6a321615f6daa7e746ce Miraielf geofenced mirai ua-wget USA x86
http://82.117.87.188/Fantazy/Fantazy.mipsc0c0eb2bf97a4c1a35c20a49d6cd457aee75983b1e45e2b0bdbeab4ff59f6119 Miraielf geofenced mips mirai ua-wget USA
http://82.117.87.188/Fantazy/Fantazy.mpsl916ff20b14c6e0a8142850a4a429b3b9e919b4c1ef513d2ec643ea1b9da83b82 Miraielf geofenced mips mirai ua-wget USA
http://82.117.87.188/Fantazy/Fantazy.armn/an/aelf ua-wget
http://82.117.87.188/Fantazy/Fantazy.arm54aac04e8622d199b7c2bb710c19d99becf6e9de6006febd55132aaeb720e5ad7 Miraiarm elf geofenced mirai ua-wget USA
http://82.117.87.188/Fantazy/Fantazy.arm6ff404e2e322896b0ddc9ed5a8d10b51c5640cdc4597c1af5dc5ecce6c6f7303a Miraiarm elf geofenced mirai ua-wget USA
http://82.117.87.188/Fantazy/Fantazy.arm76dd85ec7536d822ef2d4221cc5671c97b928f10aec4bf59b01cc76670ba13c0e Miraiarm elf geofenced mirai ua-wget USA
http://82.117.87.188/Fantazy/Fantazy.ppc65507883ad78ecacbe5a13863e6b26f691d9204a005d088c1d8a07f72bc9e7b6 Miraielf geofenced mirai PowerPC ua-wget USA
http://82.117.87.188/Fantazy/Fantazy.m68ka9b1d54d62c7fcfaf8fc9425f9ea81ea1a7389a6f3dec3e47ac7daee028002f7 Miraielf geofenced m68k mirai ua-wget USA
http://82.117.87.188/Fantazy/Fantazy.sh4c5052cb6873b1827bbca42721a888d5c60d75a9259036d6c301aeafe058db1cd Miraielf geofenced mirai SuperH ua-wget USA
http://82.117.87.188/Fantazy/Fantazy.spc7bf377eaaa9219c1a1c896f4f2ef4344d48561a3a997e4713a9a259f4f67f5ee Miraielf geofenced mirai sparc ua-wget USA
http://82.117.87.188/Fantazy/Fantazy.arc62968de2dbe56a584c60e993b8ceb1deb9841ff7ba33d35299fda647d6d3f3a2 Miraiarc elf geofenced mirai ua-wget USA
http://82.117.87.188/Fantazy/Fantazy.x86_6434e6be4d8e2968fdf50ee1165ae1ccb871eacaf0c0ec40681da91505d732e5a4 Miraielf geofenced mirai ua-wget USA x86
http://82.117.87.188/Fantazy/Fantazy.i68665b5a782c941346495e1c7e2f6bd858669bcf935c186e3ff3b5d143e65a124e8 Miraielf geofenced mirai ua-wget USA x86
http://82.117.87.188/Fantazy/Fantazy.i486a54e8cc21ed34c00daa66f29310c0e765a894fef9e8b16854abb474837ffdf5d Miraielf geofenced mirai ua-wget USA x86
http://82.117.87.188/Fantazy/Fantazy.i586n/an/aelf ua-wget

Intelligence


File Origin
# of uploads :
2
# of downloads :
50
Origin country :
DE DE
Vendor Threat Intelligence
No detections
Verdict:
Malicious
File Type:
unix shell
First seen:
2025-12-08T19:34:00Z UTC
Last seen:
2025-12-09T07:38:00Z UTC
Hits:
~10
Status:
terminated
Behavior Graph:
%3 guuid=5ffbd54d-1800-0000-49cb-ba437c0f0000 pid=3964 /usr/bin/sudo guuid=a55a8b4f-1800-0000-49cb-ba43830f0000 pid=3971 /tmp/sample.bin guuid=5ffbd54d-1800-0000-49cb-ba437c0f0000 pid=3964->guuid=a55a8b4f-1800-0000-49cb-ba43830f0000 pid=3971 execve guuid=c99c0150-1800-0000-49cb-ba43850f0000 pid=3973 /usr/bin/wget guuid=a55a8b4f-1800-0000-49cb-ba43830f0000 pid=3971->guuid=c99c0150-1800-0000-49cb-ba43850f0000 pid=3973 execve
Threat name:
Linux.Downloader.Medusa
Status:
Malicious
First seen:
2025-12-08 23:18:09 UTC
File Type:
Text (Shell)
AV detection:
23 of 38 (60.53%)
Threat level:
  3/5
Result
Malware family:
Score:
  10/10
Tags:
family:mirai antivm botnet credential_access defense_evasion discovery linux
Behaviour
Reads runtime system information
System Network Configuration Discovery
Writes file to tmp directory
Changes its process name
Checks CPU configuration
Reads system network configuration
Reads process memory
Enumerates active TCP sockets
Enumerates running processes
Writes file to system bin folder
File and Directory Permissions Modification
Executes dropped EXE
Modifies Watchdog functionality
Contacts a large (16319) amount of remote hosts
Creates a large amount of network flows
Mirai
Mirai family
Malware Config
C2 Extraction:
katana.chernobyl.network
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Linux_Shellscript_Downloader
Author:albertzsigovits
Description:Generic Approach to Shellscript downloaders

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh 5c84dacbfcf285720234d6f2d6e379de0f1efeda7fd327f3cd55cf91077f4dd9

(this sample)

  
Delivery method
Distributed via web download

Comments