MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 69cb1979c3db09d9708ddb38236f74f620af90e4f9e9c56a0cbd77e065d7cdd8. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: 69cb1979c3db09d9708ddb38236f74f620af90e4f9e9c56a0cbd77e065d7cdd8
SHA3-384 hash: 6dacd78a0842265b830ed835a730342be412d514b15bbb0d79bc07acc81400197eae586393721f537042f6304f4e867d
SHA1 hash: 61ebe4e927a3a6da4072d9a67845ead82415bda4
MD5 hash: 9fe8353617094918fc23aef53d708f36
humanhash: artist-spaghetti-fillet-maine
File name:router.zyxel.sh
Download: download sample
Signature Mirai
File size:695 bytes
First seen:2025-08-23 19:30:12 UTC
Last seen:Never
File type: sh
MIME type:text/plain
ssdeep 12:7pzcs6RzcXWzUf6KZzcXTmz6KYhzcqaOEd6Ezcc6Y0zc5Vd6n:l+BJeEzx7HboaY4vn
TLSH T15901169F581CB209B4F8DA02B85387005B0D9297DCD41F94A78D7C7AC78DC14E465656
Magika txt
Reporter abuse_ch
Tags:sh
URLMalware sample (SHA256 hash)SignatureTags
http://196.251.69.194/kitty.arm824235df77016d1aad750a9f52919f521f7354f124a9d710d4a3c98d4b64615f Ngiowebelf mirai Ngioweb ua-wget
http://196.251.69.194/kitty.mipsn/an/aelf mirai ua-wget
http://196.251.69.194/kitty.mipselcb93ba4bdeca9b98b820e6a54f5ce7259c6dea673d8ee2b92e88d39f70efb8ea Miraielf mirai ua-wget
http://196.251.69.194/kitty.aarch641a930b4aa7c5f6e140466a8309037bf5def5614f7ed514bd9010868b8f51710b Tsunamielf mirai Tsunami ua-wget
http://196.251.69.194/kitty.x86f9f93bed6018700b5d961c16acd4bff913c697831df29fa1d91dafcdd50686ec Miraielf mirai ua-wget
http://196.251.69.194/kitty.x86_64n/an/aelf mirai ua-wget

Intelligence


File Origin
# of uploads :
1
# of downloads :
29
Origin country :
DE DE
Vendor Threat Intelligence
Verdict:
Malicious
File Type:
text
Detections:
HEUR:Trojan-Downloader.Shell.Agent.p HEUR:Trojan-Downloader.Shell.Agent.a
Status:
terminated
Behavior Graph:
%3 guuid=5154ef45-1a00-0000-eb28-ea0b8a0a0000 pid=2698 /usr/bin/sudo guuid=80fcce47-1a00-0000-eb28-ea0b900a0000 pid=2704 /tmp/sample.bin guuid=5154ef45-1a00-0000-eb28-ea0b8a0a0000 pid=2698->guuid=80fcce47-1a00-0000-eb28-ea0b900a0000 pid=2704 execve guuid=9be71e48-1a00-0000-eb28-ea0b920a0000 pid=2706 /usr/bin/wget net send-data write-file guuid=80fcce47-1a00-0000-eb28-ea0b900a0000 pid=2704->guuid=9be71e48-1a00-0000-eb28-ea0b920a0000 pid=2706 execve guuid=dd84604f-1a00-0000-eb28-ea0ba40a0000 pid=2724 /usr/bin/chmod guuid=80fcce47-1a00-0000-eb28-ea0b900a0000 pid=2704->guuid=dd84604f-1a00-0000-eb28-ea0ba40a0000 pid=2724 execve guuid=8753a54f-1a00-0000-eb28-ea0ba50a0000 pid=2725 /usr/bin/dash guuid=80fcce47-1a00-0000-eb28-ea0b900a0000 pid=2704->guuid=8753a54f-1a00-0000-eb28-ea0ba50a0000 pid=2725 clone guuid=a9ae3e50-1a00-0000-eb28-ea0ba80a0000 pid=2728 /usr/bin/rm delete-file guuid=80fcce47-1a00-0000-eb28-ea0b900a0000 pid=2704->guuid=a9ae3e50-1a00-0000-eb28-ea0ba80a0000 pid=2728 execve guuid=d116a950-1a00-0000-eb28-ea0ba90a0000 pid=2729 /usr/bin/wget net send-data write-file guuid=80fcce47-1a00-0000-eb28-ea0b900a0000 pid=2704->guuid=d116a950-1a00-0000-eb28-ea0ba90a0000 pid=2729 execve guuid=df33245e-1a00-0000-eb28-ea0bc20a0000 pid=2754 /usr/bin/chmod guuid=80fcce47-1a00-0000-eb28-ea0b900a0000 pid=2704->guuid=df33245e-1a00-0000-eb28-ea0bc20a0000 pid=2754 execve guuid=4f899a5e-1a00-0000-eb28-ea0bc40a0000 pid=2756 /usr/bin/dash guuid=80fcce47-1a00-0000-eb28-ea0b900a0000 pid=2704->guuid=4f899a5e-1a00-0000-eb28-ea0bc40a0000 pid=2756 clone guuid=f82f9860-1a00-0000-eb28-ea0bc80a0000 pid=2760 /usr/bin/rm delete-file guuid=80fcce47-1a00-0000-eb28-ea0b900a0000 pid=2704->guuid=f82f9860-1a00-0000-eb28-ea0bc80a0000 pid=2760 execve guuid=1b2ed860-1a00-0000-eb28-ea0bca0a0000 pid=2762 /usr/bin/wget net send-data write-file guuid=80fcce47-1a00-0000-eb28-ea0b900a0000 pid=2704->guuid=1b2ed860-1a00-0000-eb28-ea0bca0a0000 pid=2762 execve guuid=56ea696f-1a00-0000-eb28-ea0bd90a0000 pid=2777 /usr/bin/chmod guuid=80fcce47-1a00-0000-eb28-ea0b900a0000 pid=2704->guuid=56ea696f-1a00-0000-eb28-ea0bd90a0000 pid=2777 execve guuid=48f6b06f-1a00-0000-eb28-ea0bdb0a0000 pid=2779 /usr/bin/dash guuid=80fcce47-1a00-0000-eb28-ea0b900a0000 pid=2704->guuid=48f6b06f-1a00-0000-eb28-ea0bdb0a0000 pid=2779 clone guuid=1dd22671-1a00-0000-eb28-ea0be10a0000 pid=2785 /usr/bin/rm delete-file guuid=80fcce47-1a00-0000-eb28-ea0b900a0000 pid=2704->guuid=1dd22671-1a00-0000-eb28-ea0be10a0000 pid=2785 execve guuid=8daf6b71-1a00-0000-eb28-ea0be30a0000 pid=2787 /usr/bin/wget net send-data write-file guuid=80fcce47-1a00-0000-eb28-ea0b900a0000 pid=2704->guuid=8daf6b71-1a00-0000-eb28-ea0be30a0000 pid=2787 execve guuid=1b7a3679-1a00-0000-eb28-ea0bf10a0000 pid=2801 /usr/bin/chmod guuid=80fcce47-1a00-0000-eb28-ea0b900a0000 pid=2704->guuid=1b7a3679-1a00-0000-eb28-ea0bf10a0000 pid=2801 execve guuid=dc81a879-1a00-0000-eb28-ea0bf30a0000 pid=2803 /usr/bin/dash guuid=80fcce47-1a00-0000-eb28-ea0b900a0000 pid=2704->guuid=dc81a879-1a00-0000-eb28-ea0bf30a0000 pid=2803 clone guuid=6e77387a-1a00-0000-eb28-ea0bf60a0000 pid=2806 /usr/bin/rm delete-file guuid=80fcce47-1a00-0000-eb28-ea0b900a0000 pid=2704->guuid=6e77387a-1a00-0000-eb28-ea0bf60a0000 pid=2806 execve guuid=19f1d57a-1a00-0000-eb28-ea0bf90a0000 pid=2809 /usr/bin/wget net send-data write-file guuid=80fcce47-1a00-0000-eb28-ea0b900a0000 pid=2704->guuid=19f1d57a-1a00-0000-eb28-ea0bf90a0000 pid=2809 execve guuid=607d5283-1a00-0000-eb28-ea0b030b0000 pid=2819 /usr/bin/chmod guuid=80fcce47-1a00-0000-eb28-ea0b900a0000 pid=2704->guuid=607d5283-1a00-0000-eb28-ea0b030b0000 pid=2819 execve guuid=a029ce83-1a00-0000-eb28-ea0b040b0000 pid=2820 /tmp/kitty.x86 delete-file guuid=80fcce47-1a00-0000-eb28-ea0b900a0000 pid=2704->guuid=a029ce83-1a00-0000-eb28-ea0b040b0000 pid=2820 execve guuid=96cb1b84-1a00-0000-eb28-ea0b070b0000 pid=2823 /usr/bin/rm guuid=80fcce47-1a00-0000-eb28-ea0b900a0000 pid=2704->guuid=96cb1b84-1a00-0000-eb28-ea0b070b0000 pid=2823 execve guuid=04649c84-1a00-0000-eb28-ea0b0a0b0000 pid=2826 /usr/bin/wget net send-data write-file guuid=80fcce47-1a00-0000-eb28-ea0b900a0000 pid=2704->guuid=04649c84-1a00-0000-eb28-ea0b0a0b0000 pid=2826 execve guuid=f916128b-1a00-0000-eb28-ea0b180b0000 pid=2840 /usr/bin/chmod guuid=80fcce47-1a00-0000-eb28-ea0b900a0000 pid=2704->guuid=f916128b-1a00-0000-eb28-ea0b180b0000 pid=2840 execve guuid=17f6658b-1a00-0000-eb28-ea0b190b0000 pid=2841 /tmp/kitty.x86_64 delete-file guuid=80fcce47-1a00-0000-eb28-ea0b900a0000 pid=2704->guuid=17f6658b-1a00-0000-eb28-ea0b190b0000 pid=2841 execve guuid=be06878b-1a00-0000-eb28-ea0b1b0b0000 pid=2843 /usr/bin/rm guuid=80fcce47-1a00-0000-eb28-ea0b900a0000 pid=2704->guuid=be06878b-1a00-0000-eb28-ea0b1b0b0000 pid=2843 execve 2e1ba108-bb79-560a-bab6-417767220e51 196.251.69.194:80 guuid=9be71e48-1a00-0000-eb28-ea0b920a0000 pid=2706->2e1ba108-bb79-560a-bab6-417767220e51 send: 138B guuid=d116a950-1a00-0000-eb28-ea0ba90a0000 pid=2729->2e1ba108-bb79-560a-bab6-417767220e51 send: 139B guuid=1b2ed860-1a00-0000-eb28-ea0bca0a0000 pid=2762->2e1ba108-bb79-560a-bab6-417767220e51 send: 141B guuid=8daf6b71-1a00-0000-eb28-ea0be30a0000 pid=2787->2e1ba108-bb79-560a-bab6-417767220e51 send: 142B guuid=19f1d57a-1a00-0000-eb28-ea0bf90a0000 pid=2809->2e1ba108-bb79-560a-bab6-417767220e51 send: 138B guuid=39d40a84-1a00-0000-eb28-ea0b060b0000 pid=2822 /tmp/kitty.x86 net send-data zombie guuid=a029ce83-1a00-0000-eb28-ea0b040b0000 pid=2820->guuid=39d40a84-1a00-0000-eb28-ea0b060b0000 pid=2822 clone eb9dca7b-d301-522e-83c7-8d6f291efc38 66.78.40.221:9080 guuid=39d40a84-1a00-0000-eb28-ea0b060b0000 pid=2822->eb9dca7b-d301-522e-83c7-8d6f291efc38 send: 36B 6a6ce952-23cd-5c51-b461-6ca6a8c64225 1.0.0.1:53 guuid=39d40a84-1a00-0000-eb28-ea0b060b0000 pid=2822->6a6ce952-23cd-5c51-b461-6ca6a8c64225 send: 40B guuid=04649c84-1a00-0000-eb28-ea0b0a0b0000 pid=2826->2e1ba108-bb79-560a-bab6-417767220e51 send: 141B guuid=84a77c8b-1a00-0000-eb28-ea0b1a0b0000 pid=2842 /tmp/kitty.x86_64 net send-data zombie guuid=17f6658b-1a00-0000-eb28-ea0b190b0000 pid=2841->guuid=84a77c8b-1a00-0000-eb28-ea0b1a0b0000 pid=2842 clone guuid=84a77c8b-1a00-0000-eb28-ea0b1a0b0000 pid=2842->eb9dca7b-d301-522e-83c7-8d6f291efc38 send: 74B guuid=84a77c8b-1a00-0000-eb28-ea0b1a0b0000 pid=2842->6a6ce952-23cd-5c51-b461-6ca6a8c64225 send: 40B 74e4e219-c467-5008-a212-50a3f10516d3 114.114.115.115:53 guuid=84a77c8b-1a00-0000-eb28-ea0b1a0b0000 pid=2842->74e4e219-c467-5008-a212-50a3f10516d3 send: 40B
Threat name:
Linux.Trojan.Multiverze
Status:
Malicious
First seen:
2025-08-23 19:32:42 UTC
File Type:
Text (Shell)
AV detection:
16 of 38 (42.11%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Modifies registry class
Suspicious use of SetWindowsHookEx
Enumerates physical storage devices
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh 69cb1979c3db09d9708ddb38236f74f620af90e4f9e9c56a0cbd77e065d7cdd8

(this sample)

  
Delivery method
Distributed via web download

Comments