MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 5d4c3f536405ae040761820b7ec39761cc425eea952a683de55c8bb8846f8ce2. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: 5d4c3f536405ae040761820b7ec39761cc425eea952a683de55c8bb8846f8ce2
SHA3-384 hash: 4ade3cfb3276b30db87ebd0ea3e0d5857659693bdf9aa517b715b1088f8e929bc8cd4bbb62259da35c4fcf1b273d57dc
SHA1 hash: c8b7d753132894ddb922a99e97149eb6bd50cae8
MD5 hash: 0a0c2d1c273467e5ecccbe1222a5756e
humanhash: queen-one-spaghetti-avocado
File name:curl.sh
Download: download sample
File size:676 bytes
First seen:2025-11-22 11:59:50 UTC
Last seen:Never
File type: sh
MIME type:text/plain
ssdeep 12:3J3LVqEKwpLVa9ohLVEFUILVTQUqLnTCUbSLFp1Lhr4LPwtEOXj:3J3kP3NQzTCsS1ywrXj
TLSH T17A01F5DD4B17BAB32A2DFD2EB6618A4D0050D28C5A3E13C1BC600C6CCCD1A4231A872A
Magika shell
Reporter abuse_ch
Tags:sh
URLMalware sample (SHA256 hash)SignatureTags
http://31.172.87.151/arcn/an/aelf ua-wget
http://31.172.87.151/arma8cf98b8e71e4800662e5fa1f73e8f730d51989379f7080e89eb439de1aee238 Mirai32-bit elf mirai Mozi
http://31.172.87.151/arm594d887bd9e17ef1d032b1ade397c8cdb06ad5bee97ee2acbea986815812e7833 Miraielf mirai ua-wget
http://31.172.87.151/arm73dfeaec000f3ed10fcc5e73e4511c8fae039625abb7c3ad78bd0494b9e806248 Miraielf mirai ua-wget
http://31.172.87.151/mips8ace4e3efde30f300d3c116b03ddf62b3ed8b289363f6cb97f441229b9765786 Mirai32-bit elf mirai Mozi
http://31.172.87.151/mpsl1a7cc94fc56632039953e36a6c1deb26451416d9315e00ec0a930417fd443c2a Miraielf mirai ua-wget
http://31.172.87.151/ppc86623fea2bd4b84059577d1af23790421a9a054f8021c3628f5f4e45feb292ef Miraielf mirai ua-wget
http://31.172.87.151/sh41382e61009a959a78baad1ed49599c84509e99aad0f2b8aaf8aa34fecff6e61f Miraielf mirai ua-wget

Intelligence


File Origin
# of uploads :
1
# of downloads :
28
Origin country :
DE DE
Vendor Threat Intelligence
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
evasive mirai
Verdict:
Malicious
File Type:
text
First seen:
2025-11-22T10:32:00Z UTC
Last seen:
2025-11-23T01:18:00Z UTC
Hits:
~10
Status:
terminated
Behavior Graph:
%3 guuid=d30a7376-1900-0000-7d55-53e3540e0000 pid=3668 /usr/bin/sudo guuid=3536aa79-1900-0000-7d55-53e3580e0000 pid=3672 /tmp/sample.bin guuid=d30a7376-1900-0000-7d55-53e3540e0000 pid=3668->guuid=3536aa79-1900-0000-7d55-53e3580e0000 pid=3672 execve guuid=c33f2e7a-1900-0000-7d55-53e35a0e0000 pid=3674 /usr/bin/curl net send-data write-file guuid=3536aa79-1900-0000-7d55-53e3580e0000 pid=3672->guuid=c33f2e7a-1900-0000-7d55-53e35a0e0000 pid=3674 execve guuid=1e4c8983-1900-0000-7d55-53e37c0e0000 pid=3708 /usr/bin/chmod guuid=3536aa79-1900-0000-7d55-53e3580e0000 pid=3672->guuid=1e4c8983-1900-0000-7d55-53e37c0e0000 pid=3708 execve guuid=0295ce83-1900-0000-7d55-53e37e0e0000 pid=3710 /usr/bin/dash guuid=3536aa79-1900-0000-7d55-53e3580e0000 pid=3672->guuid=0295ce83-1900-0000-7d55-53e37e0e0000 pid=3710 clone guuid=146ef584-1900-0000-7d55-53e3860e0000 pid=3718 /usr/bin/rm delete-file guuid=3536aa79-1900-0000-7d55-53e3580e0000 pid=3672->guuid=146ef584-1900-0000-7d55-53e3860e0000 pid=3718 execve guuid=23782c85-1900-0000-7d55-53e3870e0000 pid=3719 /usr/bin/curl net send-data write-file guuid=3536aa79-1900-0000-7d55-53e3580e0000 pid=3672->guuid=23782c85-1900-0000-7d55-53e3870e0000 pid=3719 execve guuid=196dae8a-1900-0000-7d55-53e3a10e0000 pid=3745 /usr/bin/chmod guuid=3536aa79-1900-0000-7d55-53e3580e0000 pid=3672->guuid=196dae8a-1900-0000-7d55-53e3a10e0000 pid=3745 execve guuid=3c1ef68a-1900-0000-7d55-53e3a30e0000 pid=3747 /usr/bin/dash guuid=3536aa79-1900-0000-7d55-53e3580e0000 pid=3672->guuid=3c1ef68a-1900-0000-7d55-53e3a30e0000 pid=3747 clone guuid=4d981b8c-1900-0000-7d55-53e3a70e0000 pid=3751 /usr/bin/rm delete-file guuid=3536aa79-1900-0000-7d55-53e3580e0000 pid=3672->guuid=4d981b8c-1900-0000-7d55-53e3a70e0000 pid=3751 execve guuid=dd755f8c-1900-0000-7d55-53e3a90e0000 pid=3753 /usr/bin/curl net send-data write-file guuid=3536aa79-1900-0000-7d55-53e3580e0000 pid=3672->guuid=dd755f8c-1900-0000-7d55-53e3a90e0000 pid=3753 execve guuid=1e808893-1900-0000-7d55-53e3bc0e0000 pid=3772 /usr/bin/chmod guuid=3536aa79-1900-0000-7d55-53e3580e0000 pid=3672->guuid=1e808893-1900-0000-7d55-53e3bc0e0000 pid=3772 execve guuid=ae26d393-1900-0000-7d55-53e3be0e0000 pid=3774 /usr/bin/dash guuid=3536aa79-1900-0000-7d55-53e3580e0000 pid=3672->guuid=ae26d393-1900-0000-7d55-53e3be0e0000 pid=3774 clone guuid=21db8c94-1900-0000-7d55-53e3c50e0000 pid=3781 /usr/bin/rm delete-file guuid=3536aa79-1900-0000-7d55-53e3580e0000 pid=3672->guuid=21db8c94-1900-0000-7d55-53e3c50e0000 pid=3781 execve guuid=b21bd494-1900-0000-7d55-53e3c70e0000 pid=3783 /usr/bin/curl net send-data write-file guuid=3536aa79-1900-0000-7d55-53e3580e0000 pid=3672->guuid=b21bd494-1900-0000-7d55-53e3c70e0000 pid=3783 execve guuid=c9cf029b-1900-0000-7d55-53e3e80e0000 pid=3816 /usr/bin/chmod guuid=3536aa79-1900-0000-7d55-53e3580e0000 pid=3672->guuid=c9cf029b-1900-0000-7d55-53e3e80e0000 pid=3816 execve guuid=c70c699b-1900-0000-7d55-53e3ea0e0000 pid=3818 /usr/bin/dash guuid=3536aa79-1900-0000-7d55-53e3580e0000 pid=3672->guuid=c70c699b-1900-0000-7d55-53e3ea0e0000 pid=3818 clone guuid=562e6ea0-1900-0000-7d55-53e3fb0e0000 pid=3835 /usr/bin/rm delete-file guuid=3536aa79-1900-0000-7d55-53e3580e0000 pid=3672->guuid=562e6ea0-1900-0000-7d55-53e3fb0e0000 pid=3835 execve guuid=842b14a1-1900-0000-7d55-53e3fc0e0000 pid=3836 /usr/bin/curl net send-data write-file guuid=3536aa79-1900-0000-7d55-53e3580e0000 pid=3672->guuid=842b14a1-1900-0000-7d55-53e3fc0e0000 pid=3836 execve guuid=878871a7-1900-0000-7d55-53e30d0f0000 pid=3853 /usr/bin/chmod guuid=3536aa79-1900-0000-7d55-53e3580e0000 pid=3672->guuid=878871a7-1900-0000-7d55-53e30d0f0000 pid=3853 execve guuid=1fd3cea7-1900-0000-7d55-53e3110f0000 pid=3857 /usr/bin/dash guuid=3536aa79-1900-0000-7d55-53e3580e0000 pid=3672->guuid=1fd3cea7-1900-0000-7d55-53e3110f0000 pid=3857 clone guuid=e30179a8-1900-0000-7d55-53e3160f0000 pid=3862 /usr/bin/rm delete-file guuid=3536aa79-1900-0000-7d55-53e3580e0000 pid=3672->guuid=e30179a8-1900-0000-7d55-53e3160f0000 pid=3862 execve guuid=071fb2a8-1900-0000-7d55-53e3170f0000 pid=3863 /usr/bin/curl net send-data write-file guuid=3536aa79-1900-0000-7d55-53e3580e0000 pid=3672->guuid=071fb2a8-1900-0000-7d55-53e3170f0000 pid=3863 execve guuid=6b53f4ae-1900-0000-7d55-53e32d0f0000 pid=3885 /usr/bin/chmod guuid=3536aa79-1900-0000-7d55-53e3580e0000 pid=3672->guuid=6b53f4ae-1900-0000-7d55-53e32d0f0000 pid=3885 execve guuid=423363af-1900-0000-7d55-53e32f0f0000 pid=3887 /usr/bin/dash guuid=3536aa79-1900-0000-7d55-53e3580e0000 pid=3672->guuid=423363af-1900-0000-7d55-53e32f0f0000 pid=3887 clone guuid=78d749b0-1900-0000-7d55-53e3370f0000 pid=3895 /usr/bin/rm delete-file guuid=3536aa79-1900-0000-7d55-53e3580e0000 pid=3672->guuid=78d749b0-1900-0000-7d55-53e3370f0000 pid=3895 execve guuid=191696b0-1900-0000-7d55-53e3390f0000 pid=3897 /usr/bin/curl net send-data write-file guuid=3536aa79-1900-0000-7d55-53e3580e0000 pid=3672->guuid=191696b0-1900-0000-7d55-53e3390f0000 pid=3897 execve guuid=067bebb5-1900-0000-7d55-53e34e0f0000 pid=3918 /usr/bin/chmod guuid=3536aa79-1900-0000-7d55-53e3580e0000 pid=3672->guuid=067bebb5-1900-0000-7d55-53e34e0f0000 pid=3918 execve guuid=28d929b6-1900-0000-7d55-53e34f0f0000 pid=3919 /usr/bin/dash guuid=3536aa79-1900-0000-7d55-53e3580e0000 pid=3672->guuid=28d929b6-1900-0000-7d55-53e34f0f0000 pid=3919 clone guuid=518f89b7-1900-0000-7d55-53e3580f0000 pid=3928 /usr/bin/rm delete-file guuid=3536aa79-1900-0000-7d55-53e3580e0000 pid=3672->guuid=518f89b7-1900-0000-7d55-53e3580f0000 pid=3928 execve guuid=5f72d1b7-1900-0000-7d55-53e3590f0000 pid=3929 /usr/bin/curl net send-data write-file guuid=3536aa79-1900-0000-7d55-53e3580e0000 pid=3672->guuid=5f72d1b7-1900-0000-7d55-53e3590f0000 pid=3929 execve guuid=490389bf-1900-0000-7d55-53e36e0f0000 pid=3950 /usr/bin/chmod guuid=3536aa79-1900-0000-7d55-53e3580e0000 pid=3672->guuid=490389bf-1900-0000-7d55-53e36e0f0000 pid=3950 execve guuid=153dc4bf-1900-0000-7d55-53e36f0f0000 pid=3951 /usr/bin/dash guuid=3536aa79-1900-0000-7d55-53e3580e0000 pid=3672->guuid=153dc4bf-1900-0000-7d55-53e36f0f0000 pid=3951 clone guuid=b5e265c0-1900-0000-7d55-53e3740f0000 pid=3956 /usr/bin/rm delete-file guuid=3536aa79-1900-0000-7d55-53e3580e0000 pid=3672->guuid=b5e265c0-1900-0000-7d55-53e3740f0000 pid=3956 execve guuid=d67710c1-1900-0000-7d55-53e3780f0000 pid=3960 /usr/bin/rm guuid=3536aa79-1900-0000-7d55-53e3580e0000 pid=3672->guuid=d67710c1-1900-0000-7d55-53e3780f0000 pid=3960 execve 9bdadf25-dd2b-53d3-9ce0-c8283c364bf0 31.172.87.151:80 guuid=c33f2e7a-1900-0000-7d55-53e35a0e0000 pid=3674->9bdadf25-dd2b-53d3-9ce0-c8283c364bf0 send: 80B guuid=23782c85-1900-0000-7d55-53e3870e0000 pid=3719->9bdadf25-dd2b-53d3-9ce0-c8283c364bf0 send: 80B guuid=dd755f8c-1900-0000-7d55-53e3a90e0000 pid=3753->9bdadf25-dd2b-53d3-9ce0-c8283c364bf0 send: 81B guuid=b21bd494-1900-0000-7d55-53e3c70e0000 pid=3783->9bdadf25-dd2b-53d3-9ce0-c8283c364bf0 send: 81B guuid=842b14a1-1900-0000-7d55-53e3fc0e0000 pid=3836->9bdadf25-dd2b-53d3-9ce0-c8283c364bf0 send: 81B guuid=071fb2a8-1900-0000-7d55-53e3170f0000 pid=3863->9bdadf25-dd2b-53d3-9ce0-c8283c364bf0 send: 81B guuid=191696b0-1900-0000-7d55-53e3390f0000 pid=3897->9bdadf25-dd2b-53d3-9ce0-c8283c364bf0 send: 80B guuid=5f72d1b7-1900-0000-7d55-53e3590f0000 pid=3929->9bdadf25-dd2b-53d3-9ce0-c8283c364bf0 send: 80B
Threat name:
Document-HTML.Downloader.Heuristic
Status:
Malicious
First seen:
2025-11-22 11:54:11 UTC
File Type:
Text (Shell)
AV detection:
7 of 24 (29.17%)
Threat level:
  2/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Modifies registry class
Suspicious use of SetWindowsHookEx
Enumerates physical storage devices
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

sh 5d4c3f536405ae040761820b7ec39761cc425eea952a683de55c8bb8846f8ce2

(this sample)

  
Delivery method
Distributed via web download

Comments