MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 6724b35a89de57521cf0b2954b2782c3f221343fff5db9ebe43cf963e64739af. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: 6724b35a89de57521cf0b2954b2782c3f221343fff5db9ebe43cf963e64739af
SHA3-384 hash: ff8749888854bd94a53dcf2361257be6f50a9c64d3590d89db534895639c8c93e79cc12a8435233da75265782a992f68
SHA1 hash: a8a84d68ce4e066d34a80d7bc094ae6046a611de
MD5 hash: cc24c020cf95044c310389a2891e95db
humanhash: wisconsin-undress-cola-lake
File name:fb
Download: download sample
Signature Mirai
File size:855 bytes
First seen:2025-12-21 15:13:55 UTC
Last seen:Never
File type: sh
MIME type:text/plain
ssdeep 24:/9ZOekX3v6hLkX3v6nRkX3v6M5dM5nkX3v6rOOkX3v6rFkX3vXw:FZTkWk2kPI9kIkekvw
TLSH T1B811ECCF14449E3055C855A83AE3546D684006E229E4560DAFDFC16758CFA087B5CE2C
Magika txt
Reporter abuse_ch
Tags:sh
URLMalware sample (SHA256 hash)SignatureTags
http://130.12.180.64/splmips2928a4694f399990791e7d0c00cb21c7fe852654df493d541097b7ce85815ec5 Miraielf mirai ua-wget
http://130.12.180.64/splmpsl3cd8a62933ca2ee92f4a556c9d59ae1679070eec6343b38d6ef6f75cf5190ced Miraielf mirai ua-wget
http://130.12.180.64/splarmd0fa73dfe2c6b4d49c31db63d4424506b62fae9d95a32134d44e4b76cf3745cd Miraielf mirai ua-wget
http://130.12.180.64/splarm50b8b4be3fec08aaec58830ce72504f9b393eab3a8190dcd14a7886aef07e28a9 Miraielf mirai ua-wget
http://130.12.180.64/splarm7ebd1877912ec628403d89fec591218730dfb454d5616e877ed2a70d12edbeedd Miraielf mirai ua-wget
http://130.12.180.64/splarm6bc8e090af02223041507c811baf2d718101317807f87bf13fc12bc99dc6e460f Miraielf mirai ua-wget

Intelligence


File Origin
# of uploads :
1
# of downloads :
38
Origin country :
DE DE
Vendor Threat Intelligence
No detections
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
busybox evasive mirai
Verdict:
Malicious
File Type:
text
First seen:
2025-12-21T12:37:00Z UTC
Last seen:
2025-12-21T15:56:00Z UTC
Hits:
~10
Status:
terminated
Behavior Graph:
%3 guuid=54dc82c9-1700-0000-9479-4ff7e40e0000 pid=3812 /usr/bin/sudo guuid=d65a22cc-1700-0000-9479-4ff7ed0e0000 pid=3821 /tmp/sample.bin guuid=54dc82c9-1700-0000-9479-4ff7e40e0000 pid=3812->guuid=d65a22cc-1700-0000-9479-4ff7ed0e0000 pid=3821 execve guuid=0c7469cc-1700-0000-9479-4ff7ef0e0000 pid=3823 /usr/bin/cp guuid=d65a22cc-1700-0000-9479-4ff7ed0e0000 pid=3821->guuid=0c7469cc-1700-0000-9479-4ff7ef0e0000 pid=3823 execve guuid=486498ce-1700-0000-9479-4ff7f50e0000 pid=3829 /usr/bin/dash guuid=d65a22cc-1700-0000-9479-4ff7ed0e0000 pid=3821->guuid=486498ce-1700-0000-9479-4ff7f50e0000 pid=3829 clone guuid=b98271d2-1700-0000-9479-4ff7070f0000 pid=3847 /usr/bin/chmod guuid=d65a22cc-1700-0000-9479-4ff7ed0e0000 pid=3821->guuid=b98271d2-1700-0000-9479-4ff7070f0000 pid=3847 execve guuid=72b6add2-1700-0000-9479-4ff7090f0000 pid=3849 /usr/bin/dash guuid=d65a22cc-1700-0000-9479-4ff7ed0e0000 pid=3821->guuid=72b6add2-1700-0000-9479-4ff7090f0000 pid=3849 clone guuid=8ee86ad4-1700-0000-9479-4ff7100f0000 pid=3856 /usr/bin/rm delete-file guuid=d65a22cc-1700-0000-9479-4ff7ed0e0000 pid=3821->guuid=8ee86ad4-1700-0000-9479-4ff7100f0000 pid=3856 execve guuid=7dade1d4-1700-0000-9479-4ff7130f0000 pid=3859 /usr/bin/dash guuid=d65a22cc-1700-0000-9479-4ff7ed0e0000 pid=3821->guuid=7dade1d4-1700-0000-9479-4ff7130f0000 pid=3859 clone guuid=ea1ec0d8-1700-0000-9479-4ff71c0f0000 pid=3868 /usr/bin/chmod guuid=d65a22cc-1700-0000-9479-4ff7ed0e0000 pid=3821->guuid=ea1ec0d8-1700-0000-9479-4ff71c0f0000 pid=3868 execve guuid=b3bdfcd8-1700-0000-9479-4ff71e0f0000 pid=3870 /usr/bin/dash guuid=d65a22cc-1700-0000-9479-4ff7ed0e0000 pid=3821->guuid=b3bdfcd8-1700-0000-9479-4ff71e0f0000 pid=3870 clone guuid=7343a0d9-1700-0000-9479-4ff7200f0000 pid=3872 /usr/bin/rm delete-file guuid=d65a22cc-1700-0000-9479-4ff7ed0e0000 pid=3821->guuid=7343a0d9-1700-0000-9479-4ff7200f0000 pid=3872 execve guuid=b77cf8d9-1700-0000-9479-4ff7210f0000 pid=3873 /usr/bin/dash guuid=d65a22cc-1700-0000-9479-4ff7ed0e0000 pid=3821->guuid=b77cf8d9-1700-0000-9479-4ff7210f0000 pid=3873 clone guuid=58fa0edd-1700-0000-9479-4ff7330f0000 pid=3891 /usr/bin/chmod guuid=d65a22cc-1700-0000-9479-4ff7ed0e0000 pid=3821->guuid=58fa0edd-1700-0000-9479-4ff7330f0000 pid=3891 execve guuid=ab834add-1700-0000-9479-4ff7350f0000 pid=3893 /usr/bin/dash guuid=d65a22cc-1700-0000-9479-4ff7ed0e0000 pid=3821->guuid=ab834add-1700-0000-9479-4ff7350f0000 pid=3893 clone guuid=0dbb10de-1700-0000-9479-4ff7390f0000 pid=3897 /usr/bin/rm delete-file guuid=d65a22cc-1700-0000-9479-4ff7ed0e0000 pid=3821->guuid=0dbb10de-1700-0000-9479-4ff7390f0000 pid=3897 execve guuid=9c326bde-1700-0000-9479-4ff73b0f0000 pid=3899 /usr/bin/dash guuid=d65a22cc-1700-0000-9479-4ff7ed0e0000 pid=3821->guuid=9c326bde-1700-0000-9479-4ff73b0f0000 pid=3899 clone guuid=cfbcdae1-1700-0000-9479-4ff74b0f0000 pid=3915 /usr/bin/chmod guuid=d65a22cc-1700-0000-9479-4ff7ed0e0000 pid=3821->guuid=cfbcdae1-1700-0000-9479-4ff74b0f0000 pid=3915 execve guuid=c39b18e2-1700-0000-9479-4ff74d0f0000 pid=3917 /usr/bin/dash guuid=d65a22cc-1700-0000-9479-4ff7ed0e0000 pid=3821->guuid=c39b18e2-1700-0000-9479-4ff74d0f0000 pid=3917 clone guuid=59cc5ae3-1700-0000-9479-4ff7530f0000 pid=3923 /usr/bin/rm delete-file guuid=d65a22cc-1700-0000-9479-4ff7ed0e0000 pid=3821->guuid=59cc5ae3-1700-0000-9479-4ff7530f0000 pid=3923 execve guuid=d2eda1e3-1700-0000-9479-4ff7540f0000 pid=3924 /usr/bin/dash guuid=d65a22cc-1700-0000-9479-4ff7ed0e0000 pid=3821->guuid=d2eda1e3-1700-0000-9479-4ff7540f0000 pid=3924 clone guuid=c81364e7-1700-0000-9479-4ff7620f0000 pid=3938 /usr/bin/chmod guuid=d65a22cc-1700-0000-9479-4ff7ed0e0000 pid=3821->guuid=c81364e7-1700-0000-9479-4ff7620f0000 pid=3938 execve guuid=5efba9e7-1700-0000-9479-4ff7650f0000 pid=3941 /usr/bin/dash guuid=d65a22cc-1700-0000-9479-4ff7ed0e0000 pid=3821->guuid=5efba9e7-1700-0000-9479-4ff7650f0000 pid=3941 clone guuid=a79532e9-1700-0000-9479-4ff76e0f0000 pid=3950 /usr/bin/rm delete-file guuid=d65a22cc-1700-0000-9479-4ff7ed0e0000 pid=3821->guuid=a79532e9-1700-0000-9479-4ff76e0f0000 pid=3950 execve guuid=17f777e9-1700-0000-9479-4ff76f0f0000 pid=3951 /usr/bin/dash guuid=d65a22cc-1700-0000-9479-4ff7ed0e0000 pid=3821->guuid=17f777e9-1700-0000-9479-4ff76f0f0000 pid=3951 clone guuid=b07aa2ec-1700-0000-9479-4ff7800f0000 pid=3968 /usr/bin/chmod guuid=d65a22cc-1700-0000-9479-4ff7ed0e0000 pid=3821->guuid=b07aa2ec-1700-0000-9479-4ff7800f0000 pid=3968 execve guuid=95a5dbec-1700-0000-9479-4ff7820f0000 pid=3970 /usr/bin/dash guuid=d65a22cc-1700-0000-9479-4ff7ed0e0000 pid=3821->guuid=95a5dbec-1700-0000-9479-4ff7820f0000 pid=3970 clone guuid=8208deed-1700-0000-9479-4ff7870f0000 pid=3975 /usr/bin/rm delete-file guuid=d65a22cc-1700-0000-9479-4ff7ed0e0000 pid=3821->guuid=8208deed-1700-0000-9479-4ff7870f0000 pid=3975 execve guuid=e98819ee-1700-0000-9479-4ff7890f0000 pid=3977 /usr/bin/rm delete-file guuid=d65a22cc-1700-0000-9479-4ff7ed0e0000 pid=3821->guuid=e98819ee-1700-0000-9479-4ff7890f0000 pid=3977 execve guuid=9c77b4ce-1700-0000-9479-4ff7f60e0000 pid=3830 /usr/bin/busybox net send-data write-file guuid=486498ce-1700-0000-9479-4ff7f50e0000 pid=3829->guuid=9c77b4ce-1700-0000-9479-4ff7f60e0000 pid=3830 execve f22fee75-ab34-540d-95fe-696883c6f4ad 130.12.180.64:80 guuid=9c77b4ce-1700-0000-9479-4ff7f60e0000 pid=3830->f22fee75-ab34-540d-95fe-696883c6f4ad send: 83B guuid=1783f2d4-1700-0000-9479-4ff7140f0000 pid=3860 /usr/bin/busybox net send-data write-file guuid=7dade1d4-1700-0000-9479-4ff7130f0000 pid=3859->guuid=1783f2d4-1700-0000-9479-4ff7140f0000 pid=3860 execve guuid=1783f2d4-1700-0000-9479-4ff7140f0000 pid=3860->f22fee75-ab34-540d-95fe-696883c6f4ad send: 83B guuid=b00802da-1700-0000-9479-4ff7220f0000 pid=3874 /usr/bin/busybox net send-data write-file guuid=b77cf8d9-1700-0000-9479-4ff7210f0000 pid=3873->guuid=b00802da-1700-0000-9479-4ff7220f0000 pid=3874 execve guuid=b00802da-1700-0000-9479-4ff7220f0000 pid=3874->f22fee75-ab34-540d-95fe-696883c6f4ad send: 82B guuid=d0357bde-1700-0000-9479-4ff73c0f0000 pid=3900 /usr/bin/busybox net send-data write-file guuid=9c326bde-1700-0000-9479-4ff73b0f0000 pid=3899->guuid=d0357bde-1700-0000-9479-4ff73c0f0000 pid=3900 execve guuid=d0357bde-1700-0000-9479-4ff73c0f0000 pid=3900->f22fee75-ab34-540d-95fe-696883c6f4ad send: 83B guuid=8506ade3-1700-0000-9479-4ff7550f0000 pid=3925 /usr/bin/busybox net send-data write-file guuid=d2eda1e3-1700-0000-9479-4ff7540f0000 pid=3924->guuid=8506ade3-1700-0000-9479-4ff7550f0000 pid=3925 execve guuid=8506ade3-1700-0000-9479-4ff7550f0000 pid=3925->f22fee75-ab34-540d-95fe-696883c6f4ad send: 83B guuid=6b3d80e9-1700-0000-9479-4ff7700f0000 pid=3952 /usr/bin/busybox net send-data write-file guuid=17f777e9-1700-0000-9479-4ff76f0f0000 pid=3951->guuid=6b3d80e9-1700-0000-9479-4ff7700f0000 pid=3952 execve guuid=6b3d80e9-1700-0000-9479-4ff7700f0000 pid=3952->f22fee75-ab34-540d-95fe-696883c6f4ad send: 83B
Threat name:
Linux.Downloader.Generic
Status:
Suspicious
First seen:
2025-12-21 15:33:20 UTC
File Type:
Text (Shell)
AV detection:
10 of 24 (41.67%)
Threat level:
  3/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Modifies registry class
Suspicious use of SetWindowsHookEx
Enumerates physical storage devices
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh 6724b35a89de57521cf0b2954b2782c3f221343fff5db9ebe43cf963e64739af

(this sample)

  
Delivery method
Distributed via web download

Comments