MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 5fa9504d690f51a903b673750798126943aaf62bc8e6344426af2a619beb8ce5. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 7


Intelligence 7 IOCs YARA 1 File information Comments

SHA256 hash: 5fa9504d690f51a903b673750798126943aaf62bc8e6344426af2a619beb8ce5
SHA3-384 hash: 3b179fafa4072cb1132ab5c74fba171312862aecff808bdbf2a6456cdb639cff99d83b522f352f202abe85df8918d6cc
SHA1 hash: 3e58afb0319bf41c3a8ff43ee5923e90a7329af3
MD5 hash: 65790f376b695da9560236d13e78d085
humanhash: lake-grey-jig-tennessee
File name:juice
Download: download sample
Signature Mirai
File size:1'542 bytes
First seen:2025-10-25 17:08:12 UTC
Last seen:Never
File type: sh
MIME type:text/x-shellscript
ssdeep 24:G10B5zooOB0p9z5hRGqCZVZ5gxFvBjC8atkkK:GG5Uou0jDRfCnZ+xFZVat/K
TLSH T15D31BBFF90C03B22284054DDF9830E2AB545A1CE65C8CAC8B55B0C75A6CDF04BB7AFA4
Magika shell
Reporter abuse_ch
Tags:sh
URLMalware sample (SHA256 hash)SignatureTags
http://78.153.140.124/b1n/arm6d36a432aa0165f19b64365eb1339c9ad2593d2fb49db18581654042f67390bf Miraiarm elf geofenced mirai ua-wget USA
http://78.153.140.124/b1n/arm5c4a1f4db8f6a5c9a040403905726c6d56d448eff3654765283fd7c768a881a87 Miraiarm elf geofenced mirai ua-wget USA
http://78.153.140.124/b1n/arm676cb047623f8b366cd1d6c949c30a9ef394bd6a9337b97afbb2ea5b9fffb5fc2 Miraiarm elf geofenced mirai ua-wget USA
http://78.153.140.124/b1n/arm7bdba01cbfa0b446e9486d55b37340d1347789b88693f6e1c85ed6c02b838b90b Miraiarm elf geofenced mirai ua-wget USA
http://78.153.140.124/b1n/mipse143e72541d710a377db83b1a71968648e8ed280ab9a5ac02cd2678963001fef Gafgytelf gafgyt geofenced mips ua-wget USA
http://78.153.140.124/b1n/mpsl630aa755331ab6e986384bc6e760b8aaaddea550ac2921124ff7b3e2ce142acc Gafgytelf gafgyt geofenced mips ua-wget USA
http://78.153.140.124/b1n/x86289510dd049a4e5c6dbe146d858ffbafdb53b2d0aa91f229b449ab7341af1b71 Miraielf geofenced mirai ua-wget USA x86

Intelligence


File Origin
# of uploads :
1
# of downloads :
54
Origin country :
DE DE
Vendor Threat Intelligence
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
busybox
Verdict:
Malicious
File Type:
unix shell
First seen:
2025-10-25T14:24:00Z UTC
Last seen:
2025-10-26T00:50:00Z UTC
Hits:
~10
Detections:
HEUR:Trojan-Downloader.Shell.Agent.a
Status:
terminated
Behavior Graph:
%3 guuid=e3d45f8c-1600-0000-5c4b-ba62610c0000 pid=3169 /usr/bin/sudo guuid=52637f8e-1600-0000-5c4b-ba62680c0000 pid=3176 /tmp/sample.bin guuid=e3d45f8c-1600-0000-5c4b-ba62610c0000 pid=3169->guuid=52637f8e-1600-0000-5c4b-ba62680c0000 pid=3176 execve guuid=3967e58e-1600-0000-5c4b-ba626b0c0000 pid=3179 /usr/bin/dash guuid=52637f8e-1600-0000-5c4b-ba62680c0000 pid=3176->guuid=3967e58e-1600-0000-5c4b-ba626b0c0000 pid=3179 clone guuid=fdc8bf8f-1600-0000-5c4b-ba62730c0000 pid=3187 /usr/bin/rm delete-file guuid=52637f8e-1600-0000-5c4b-ba62680c0000 pid=3176->guuid=fdc8bf8f-1600-0000-5c4b-ba62730c0000 pid=3187 execve guuid=2eabfc8f-1600-0000-5c4b-ba62750c0000 pid=3189 /usr/bin/rm delete-file guuid=52637f8e-1600-0000-5c4b-ba62680c0000 pid=3176->guuid=2eabfc8f-1600-0000-5c4b-ba62750c0000 pid=3189 execve guuid=8c1e3f90-1600-0000-5c4b-ba62770c0000 pid=3191 /usr/bin/rm delete-file guuid=52637f8e-1600-0000-5c4b-ba62680c0000 pid=3176->guuid=8c1e3f90-1600-0000-5c4b-ba62770c0000 pid=3191 execve guuid=65267d90-1600-0000-5c4b-ba62790c0000 pid=3193 /usr/bin/rm guuid=52637f8e-1600-0000-5c4b-ba62680c0000 pid=3176->guuid=65267d90-1600-0000-5c4b-ba62790c0000 pid=3193 execve guuid=ac23b990-1600-0000-5c4b-ba627b0c0000 pid=3195 /usr/bin/dash guuid=52637f8e-1600-0000-5c4b-ba62680c0000 pid=3176->guuid=ac23b990-1600-0000-5c4b-ba627b0c0000 pid=3195 clone guuid=130d2e91-1600-0000-5c4b-ba627e0c0000 pid=3198 /usr/bin/dash guuid=52637f8e-1600-0000-5c4b-ba62680c0000 pid=3176->guuid=130d2e91-1600-0000-5c4b-ba627e0c0000 pid=3198 clone guuid=cc3b9191-1600-0000-5c4b-ba62800c0000 pid=3200 /usr/bin/dash guuid=52637f8e-1600-0000-5c4b-ba62680c0000 pid=3176->guuid=cc3b9191-1600-0000-5c4b-ba62800c0000 pid=3200 clone guuid=e95099a5-1600-0000-5c4b-ba62930c0000 pid=3219 /usr/bin/chmod guuid=52637f8e-1600-0000-5c4b-ba62680c0000 pid=3176->guuid=e95099a5-1600-0000-5c4b-ba62930c0000 pid=3219 execve guuid=6a9bf0a5-1600-0000-5c4b-ba62940c0000 pid=3220 /usr/bin/dash guuid=52637f8e-1600-0000-5c4b-ba62680c0000 pid=3176->guuid=6a9bf0a5-1600-0000-5c4b-ba62940c0000 pid=3220 clone guuid=cbc1b0a6-1600-0000-5c4b-ba62960c0000 pid=3222 /usr/bin/dash guuid=52637f8e-1600-0000-5c4b-ba62680c0000 pid=3176->guuid=cbc1b0a6-1600-0000-5c4b-ba62960c0000 pid=3222 clone guuid=78260fb9-1600-0000-5c4b-ba62ac0c0000 pid=3244 /usr/bin/chmod guuid=52637f8e-1600-0000-5c4b-ba62680c0000 pid=3176->guuid=78260fb9-1600-0000-5c4b-ba62ac0c0000 pid=3244 execve guuid=074e69b9-1600-0000-5c4b-ba62ae0c0000 pid=3246 /usr/bin/dash guuid=52637f8e-1600-0000-5c4b-ba62680c0000 pid=3176->guuid=074e69b9-1600-0000-5c4b-ba62ae0c0000 pid=3246 clone guuid=f49962ba-1600-0000-5c4b-ba62b00c0000 pid=3248 /usr/bin/dash guuid=52637f8e-1600-0000-5c4b-ba62680c0000 pid=3176->guuid=f49962ba-1600-0000-5c4b-ba62b00c0000 pid=3248 clone guuid=53ba54d0-1600-0000-5c4b-ba62c50c0000 pid=3269 /usr/bin/chmod guuid=52637f8e-1600-0000-5c4b-ba62680c0000 pid=3176->guuid=53ba54d0-1600-0000-5c4b-ba62c50c0000 pid=3269 execve guuid=b60ac5d0-1600-0000-5c4b-ba62c70c0000 pid=3271 /usr/bin/dash guuid=52637f8e-1600-0000-5c4b-ba62680c0000 pid=3176->guuid=b60ac5d0-1600-0000-5c4b-ba62c70c0000 pid=3271 clone guuid=8cc2b2d1-1600-0000-5c4b-ba62ca0c0000 pid=3274 /usr/bin/dash guuid=52637f8e-1600-0000-5c4b-ba62680c0000 pid=3176->guuid=8cc2b2d1-1600-0000-5c4b-ba62ca0c0000 pid=3274 clone guuid=fc3473e7-1600-0000-5c4b-ba62ee0c0000 pid=3310 /usr/bin/chmod guuid=52637f8e-1600-0000-5c4b-ba62680c0000 pid=3176->guuid=fc3473e7-1600-0000-5c4b-ba62ee0c0000 pid=3310 execve guuid=7939f2e7-1600-0000-5c4b-ba62ef0c0000 pid=3311 /usr/bin/dash guuid=52637f8e-1600-0000-5c4b-ba62680c0000 pid=3176->guuid=7939f2e7-1600-0000-5c4b-ba62ef0c0000 pid=3311 clone guuid=c48bede8-1600-0000-5c4b-ba62f30c0000 pid=3315 /usr/bin/dash guuid=52637f8e-1600-0000-5c4b-ba62680c0000 pid=3176->guuid=c48bede8-1600-0000-5c4b-ba62f30c0000 pid=3315 clone guuid=8173fdfc-1600-0000-5c4b-ba62120d0000 pid=3346 /usr/bin/chmod guuid=52637f8e-1600-0000-5c4b-ba62680c0000 pid=3176->guuid=8173fdfc-1600-0000-5c4b-ba62120d0000 pid=3346 execve guuid=f63a86fd-1600-0000-5c4b-ba62140d0000 pid=3348 /usr/bin/dash guuid=52637f8e-1600-0000-5c4b-ba62680c0000 pid=3176->guuid=f63a86fd-1600-0000-5c4b-ba62140d0000 pid=3348 clone guuid=9c47e8ff-1600-0000-5c4b-ba621a0d0000 pid=3354 /usr/bin/dash guuid=52637f8e-1600-0000-5c4b-ba62680c0000 pid=3176->guuid=9c47e8ff-1600-0000-5c4b-ba621a0d0000 pid=3354 clone guuid=3ef21516-1700-0000-5c4b-ba62300d0000 pid=3376 /usr/bin/chmod guuid=52637f8e-1600-0000-5c4b-ba62680c0000 pid=3176->guuid=3ef21516-1700-0000-5c4b-ba62300d0000 pid=3376 execve guuid=15f55a16-1700-0000-5c4b-ba62310d0000 pid=3377 /usr/bin/dash guuid=52637f8e-1600-0000-5c4b-ba62680c0000 pid=3176->guuid=15f55a16-1700-0000-5c4b-ba62310d0000 pid=3377 clone guuid=4abbf616-1700-0000-5c4b-ba62350d0000 pid=3381 /usr/bin/dash guuid=52637f8e-1600-0000-5c4b-ba62680c0000 pid=3176->guuid=4abbf616-1700-0000-5c4b-ba62350d0000 pid=3381 clone guuid=385cde25-1700-0000-5c4b-ba625b0d0000 pid=3419 /usr/bin/chmod guuid=52637f8e-1600-0000-5c4b-ba62680c0000 pid=3176->guuid=385cde25-1700-0000-5c4b-ba625b0d0000 pid=3419 execve guuid=df893c26-1700-0000-5c4b-ba625d0d0000 pid=3421 /run/user/1000/.e delete-file net write-file guuid=52637f8e-1600-0000-5c4b-ba62680c0000 pid=3176->guuid=df893c26-1700-0000-5c4b-ba625d0d0000 pid=3421 execve guuid=2b4bc42e-1700-0000-5c4b-ba62690d0000 pid=3433 /usr/bin/rm delete-file guuid=52637f8e-1600-0000-5c4b-ba62680c0000 pid=3176->guuid=2b4bc42e-1700-0000-5c4b-ba62690d0000 pid=3433 execve guuid=c4a2232f-1700-0000-5c4b-ba626b0d0000 pid=3435 /usr/bin/busybox guuid=52637f8e-1600-0000-5c4b-ba62680c0000 pid=3176->guuid=c4a2232f-1700-0000-5c4b-ba626b0d0000 pid=3435 execve guuid=9654ec8e-1600-0000-5c4b-ba626c0c0000 pid=3180 /usr/bin/cat guuid=3967e58e-1600-0000-5c4b-ba626b0c0000 pid=3179->guuid=9654ec8e-1600-0000-5c4b-ba626c0c0000 pid=3180 execve guuid=89e3f18e-1600-0000-5c4b-ba626d0c0000 pid=3181 /usr/bin/grep guuid=3967e58e-1600-0000-5c4b-ba626b0c0000 pid=3179->guuid=89e3f18e-1600-0000-5c4b-ba626d0c0000 pid=3181 execve guuid=2ea4f68e-1600-0000-5c4b-ba626e0c0000 pid=3182 /usr/bin/grep guuid=3967e58e-1600-0000-5c4b-ba626b0c0000 pid=3179->guuid=2ea4f68e-1600-0000-5c4b-ba626e0c0000 pid=3182 execve guuid=c361058f-1600-0000-5c4b-ba626f0c0000 pid=3183 /usr/bin/grep guuid=3967e58e-1600-0000-5c4b-ba626b0c0000 pid=3179->guuid=c361058f-1600-0000-5c4b-ba626f0c0000 pid=3183 execve guuid=8761248f-1600-0000-5c4b-ba62710c0000 pid=3185 /usr/bin/cut guuid=3967e58e-1600-0000-5c4b-ba626b0c0000 pid=3179->guuid=8761248f-1600-0000-5c4b-ba62710c0000 pid=3185 execve guuid=bb73be90-1600-0000-5c4b-ba627c0c0000 pid=3196 /usr/bin/cp write-file guuid=ac23b990-1600-0000-5c4b-ba627b0c0000 pid=3195->guuid=bb73be90-1600-0000-5c4b-ba627c0c0000 pid=3196 execve guuid=f75b3791-1600-0000-5c4b-ba627f0c0000 pid=3199 /usr/bin/chmod guuid=130d2e91-1600-0000-5c4b-ba627e0c0000 pid=3198->guuid=f75b3791-1600-0000-5c4b-ba627f0c0000 pid=3199 execve guuid=de88a091-1600-0000-5c4b-ba62810c0000 pid=3201 /usr/bin/wget net send-data write-file guuid=cc3b9191-1600-0000-5c4b-ba62800c0000 pid=3200->guuid=de88a091-1600-0000-5c4b-ba62810c0000 pid=3201 execve 97d25fe6-b635-5dc4-b4bb-dbe8c55c614e 78.153.140.124:80 guuid=de88a091-1600-0000-5c4b-ba62810c0000 pid=3201->97d25fe6-b635-5dc4-b4bb-dbe8c55c614e send: 136B guuid=e09bbaa6-1600-0000-5c4b-ba62970c0000 pid=3223 /usr/bin/wget net send-data write-file guuid=cbc1b0a6-1600-0000-5c4b-ba62960c0000 pid=3222->guuid=e09bbaa6-1600-0000-5c4b-ba62970c0000 pid=3223 execve guuid=e09bbaa6-1600-0000-5c4b-ba62970c0000 pid=3223->97d25fe6-b635-5dc4-b4bb-dbe8c55c614e send: 137B guuid=55106eba-1600-0000-5c4b-ba62b10c0000 pid=3249 /usr/bin/wget net send-data write-file guuid=f49962ba-1600-0000-5c4b-ba62b00c0000 pid=3248->guuid=55106eba-1600-0000-5c4b-ba62b10c0000 pid=3249 execve guuid=55106eba-1600-0000-5c4b-ba62b10c0000 pid=3249->97d25fe6-b635-5dc4-b4bb-dbe8c55c614e send: 137B guuid=1191c5d1-1600-0000-5c4b-ba62cb0c0000 pid=3275 /usr/bin/wget net send-data write-file guuid=8cc2b2d1-1600-0000-5c4b-ba62ca0c0000 pid=3274->guuid=1191c5d1-1600-0000-5c4b-ba62cb0c0000 pid=3275 execve guuid=1191c5d1-1600-0000-5c4b-ba62cb0c0000 pid=3275->97d25fe6-b635-5dc4-b4bb-dbe8c55c614e send: 137B guuid=30a0fde8-1600-0000-5c4b-ba62f40c0000 pid=3316 /usr/bin/wget net send-data write-file guuid=c48bede8-1600-0000-5c4b-ba62f30c0000 pid=3315->guuid=30a0fde8-1600-0000-5c4b-ba62f40c0000 pid=3316 execve guuid=30a0fde8-1600-0000-5c4b-ba62f40c0000 pid=3316->97d25fe6-b635-5dc4-b4bb-dbe8c55c614e send: 137B guuid=0429f3ff-1600-0000-5c4b-ba621b0d0000 pid=3355 /usr/bin/wget net send-data write-file guuid=9c47e8ff-1600-0000-5c4b-ba621a0d0000 pid=3354->guuid=0429f3ff-1600-0000-5c4b-ba621b0d0000 pid=3355 execve guuid=0429f3ff-1600-0000-5c4b-ba621b0d0000 pid=3355->97d25fe6-b635-5dc4-b4bb-dbe8c55c614e send: 137B guuid=cfd2fe16-1700-0000-5c4b-ba62360d0000 pid=3382 /usr/bin/wget net send-data write-file guuid=4abbf616-1700-0000-5c4b-ba62350d0000 pid=3381->guuid=cfd2fe16-1700-0000-5c4b-ba62360d0000 pid=3382 execve guuid=cfd2fe16-1700-0000-5c4b-ba62360d0000 pid=3382->97d25fe6-b635-5dc4-b4bb-dbe8c55c614e send: 136B 8b0a01dc-0728-52c1-8024-c4ba7801b8d6 8.8.8.8:53 guuid=df893c26-1700-0000-5c4b-ba625d0d0000 pid=3421->8b0a01dc-0728-52c1-8024-c4ba7801b8d6 con guuid=6f7dbb2e-1700-0000-5c4b-ba62680d0000 pid=3432 /run/user/1000/.e dns net send-data write-file zombie guuid=df893c26-1700-0000-5c4b-ba625d0d0000 pid=3421->guuid=6f7dbb2e-1700-0000-5c4b-ba62680d0000 pid=3432 clone guuid=6f7dbb2e-1700-0000-5c4b-ba62680d0000 pid=3432->8b0a01dc-0728-52c1-8024-c4ba7801b8d6 send: 70B aecb90b6-e291-57a1-8f17-eeb0bbd81200 blueblackside.com:7777 guuid=6f7dbb2e-1700-0000-5c4b-ba62680d0000 pid=3432->aecb90b6-e291-57a1-8f17-eeb0bbd81200 send: 49B 7f30281f-6565-565b-903e-76ab0b9d4286 stun.l.google.com:19302 guuid=6f7dbb2e-1700-0000-5c4b-ba62680d0000 pid=3432->7f30281f-6565-565b-903e-76ab0b9d4286 send: 20B guuid=66a9d22e-1700-0000-5c4b-ba626a0d0000 pid=3434 /run/user/1000/.e write-file guuid=6f7dbb2e-1700-0000-5c4b-ba62680d0000 pid=3432->guuid=66a9d22e-1700-0000-5c4b-ba626a0d0000 pid=3434 clone
Verdict:
Malicious
Threat:
Trojan-Downloader.Shell.Agent
Result
Malware family:
n/a
Score:
  7/10
Tags:
credential_access defense_evasion discovery linux
Behaviour
Reads runtime system information
System Network Configuration Discovery
Writes file to shm directory
Writes file to tmp directory
Changes its process name
Reads system network configuration
Reads process memory
Enumerates active TCP sockets
Enumerates running processes
Reads MAC address of network interface
Reads system routing table
File and Directory Permissions Modification
Deletes itself
Executes dropped EXE
Renames itself
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:ach_202412_suspect_bash_script
Author:abuse.ch
Description:Detects suspicious Linux bash scripts

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh 5fa9504d690f51a903b673750798126943aaf62bc8e6344426af2a619beb8ce5

(this sample)

  
Delivery method
Distributed via web download

Comments