MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 6a4915bf4b390075f3e3c001e2157dafc4f82e5098ed22a16506f6d19d4a80ec. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 7


Intelligence 7 IOCs YARA 1 File information Comments

SHA256 hash: 6a4915bf4b390075f3e3c001e2157dafc4f82e5098ed22a16506f6d19d4a80ec
SHA3-384 hash: 2adaa1f572a9c5a649cba50a59d3e31307db2f0636ae89dff3ca9bd38d8bb45a4ba36890d847b07dde3809d97aa65991
SHA1 hash: b40f1a196961ab62b55cfb7c1df457622afedfc5
MD5 hash: 123e8e24c5431bc4c622aa4d7620e5df
humanhash: missouri-white-purple-zulu
File name:wget.sh
Download: download sample
Signature Mirai
File size:909 bytes
First seen:2026-01-11 06:38:36 UTC
Last seen:2026-01-11 17:10:59 UTC
File type: sh
MIME type:text/plain
ssdeep 12:S6eBj+d6Q3Xw+d6ONIBSkA+d6ToKSu+d6bMF+d6Ul9E+d6o9oE+d66F6Z+d6UxHZ:ABo9NIIGKSLcl9X9O3TTY+/xn
TLSH T15F11BA8D0154982D08F5CD1C30EE9605AABEA3C478754B3CAC5514B374A75B06E5CF8F
Magika txt
Reporter abuse_ch
Tags:sh
URLMalware sample (SHA256 hash)SignatureTags
http://31.59.58.26/main_armb9609e8857f4a5e96b74c1fefdb1758ad17d9d0f61519979c45b71ec673775b1 Miraielf mirai ua-wget
http://31.59.58.26/main_arm5d7cd33558dc7b61bd0280c4a034fceaa94d9999786ebf3ac1e11e268ee49dac6 Miraielf mirai ua-wget
http://31.59.58.26/main_arm6d23c1173da8453e626682040bcc70f16feb077178092f09e867630805c79e084 Miraielf mirai ua-wget
http://31.59.58.26/main_arm7e72bf6b7fa14a9381c0bf3d53d30fa8241bd4ea0e2120f8bfb6abdbcab1bea9a Miraielf mirai ua-wget
http://31.59.58.26/main_m68k5a9e7b5506932ac1d05874291f15bb22288e9eb5a67eb9de697842aed0a1a231 Miraielf mirai ua-wget
http://31.59.58.26/main_mips626b1a35e650708831b2b7635d4dc0e55c851793b2dce022d8da5ec4d6f9b8ab Miraielf mirai ua-wget
http://31.59.58.26/main_mpsl680747b4f84f243e6ac93a74301f386a54312fbfade552d2e56cbb17719d5447 Miraielf mirai ua-wget
http://31.59.58.26/main_ppc91d4adc3bc5b7089d7e5b973960b92d0f5debed3ce8db8d33bbcec99372f138c Miraielf mirai ua-wget
http://31.59.58.26/main_sh42a55b329a7fe41c957bb43bb3b0837cf444f9157636727c5d9c36b8bb79d8e9f Miraielf mirai ua-wget
http://31.59.58.26/main_spcn/an/aelf ua-wget
http://31.59.58.26/main_x8650f0dae24f260c2192970644904f97b116180eccf0b4fe291d818376ea4eeff7 Miraielf mirai ua-wget
http://31.59.58.26/main_x86_64n/an/aelf ua-wget

Intelligence


File Origin
# of uploads :
2
# of downloads :
50
Origin country :
DE DE
Vendor Threat Intelligence
No detections
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
mirai
Verdict:
Malicious
File Type:
text
First seen:
2026-01-11T03:45:00Z UTC
Last seen:
2026-01-11T03:50:00Z UTC
Hits:
~10
Detections:
HEUR:Trojan-Downloader.Shell.Agent.a
Status:
terminated
Behavior Graph:
%3 guuid=10bdb822-1b00-0000-04b5-c4f5ee0a0000 pid=2798 /usr/bin/sudo guuid=6ece2326-1b00-0000-04b5-c4f5f30a0000 pid=2803 /tmp/sample.bin guuid=10bdb822-1b00-0000-04b5-c4f5ee0a0000 pid=2798->guuid=6ece2326-1b00-0000-04b5-c4f5f30a0000 pid=2803 execve guuid=293a7926-1b00-0000-04b5-c4f5f50a0000 pid=2805 /usr/bin/wget net send-data write-file guuid=6ece2326-1b00-0000-04b5-c4f5f30a0000 pid=2803->guuid=293a7926-1b00-0000-04b5-c4f5f50a0000 pid=2805 execve guuid=f2c05a2c-1b00-0000-04b5-c4f5ff0a0000 pid=2815 /usr/bin/chmod guuid=6ece2326-1b00-0000-04b5-c4f5f30a0000 pid=2803->guuid=f2c05a2c-1b00-0000-04b5-c4f5ff0a0000 pid=2815 execve guuid=7d060c2d-1b00-0000-04b5-c4f5000b0000 pid=2816 /usr/bin/dash guuid=6ece2326-1b00-0000-04b5-c4f5f30a0000 pid=2803->guuid=7d060c2d-1b00-0000-04b5-c4f5000b0000 pid=2816 clone guuid=4572132e-1b00-0000-04b5-c4f5050b0000 pid=2821 /usr/bin/wget net send-data write-file guuid=6ece2326-1b00-0000-04b5-c4f5f30a0000 pid=2803->guuid=4572132e-1b00-0000-04b5-c4f5050b0000 pid=2821 execve guuid=40e4e934-1b00-0000-04b5-c4f5120b0000 pid=2834 /usr/bin/chmod guuid=6ece2326-1b00-0000-04b5-c4f5f30a0000 pid=2803->guuid=40e4e934-1b00-0000-04b5-c4f5120b0000 pid=2834 execve guuid=5f573735-1b00-0000-04b5-c4f5140b0000 pid=2836 /usr/bin/dash guuid=6ece2326-1b00-0000-04b5-c4f5f30a0000 pid=2803->guuid=5f573735-1b00-0000-04b5-c4f5140b0000 pid=2836 clone guuid=173fcb35-1b00-0000-04b5-c4f5170b0000 pid=2839 /usr/bin/wget net send-data write-file guuid=6ece2326-1b00-0000-04b5-c4f5f30a0000 pid=2803->guuid=173fcb35-1b00-0000-04b5-c4f5170b0000 pid=2839 execve guuid=d1059e38-1b00-0000-04b5-c4f51d0b0000 pid=2845 /usr/bin/chmod guuid=6ece2326-1b00-0000-04b5-c4f5f30a0000 pid=2803->guuid=d1059e38-1b00-0000-04b5-c4f51d0b0000 pid=2845 execve guuid=b4401e39-1b00-0000-04b5-c4f51f0b0000 pid=2847 /usr/bin/dash guuid=6ece2326-1b00-0000-04b5-c4f5f30a0000 pid=2803->guuid=b4401e39-1b00-0000-04b5-c4f51f0b0000 pid=2847 clone guuid=b218eb39-1b00-0000-04b5-c4f5220b0000 pid=2850 /usr/bin/wget net send-data write-file guuid=6ece2326-1b00-0000-04b5-c4f5f30a0000 pid=2803->guuid=b218eb39-1b00-0000-04b5-c4f5220b0000 pid=2850 execve guuid=b32dc63d-1b00-0000-04b5-c4f5290b0000 pid=2857 /usr/bin/chmod guuid=6ece2326-1b00-0000-04b5-c4f5f30a0000 pid=2803->guuid=b32dc63d-1b00-0000-04b5-c4f5290b0000 pid=2857 execve guuid=7769313e-1b00-0000-04b5-c4f52b0b0000 pid=2859 /usr/bin/dash guuid=6ece2326-1b00-0000-04b5-c4f5f30a0000 pid=2803->guuid=7769313e-1b00-0000-04b5-c4f52b0b0000 pid=2859 clone guuid=fcf4e03e-1b00-0000-04b5-c4f52e0b0000 pid=2862 /usr/bin/wget net send-data write-file guuid=6ece2326-1b00-0000-04b5-c4f5f30a0000 pid=2803->guuid=fcf4e03e-1b00-0000-04b5-c4f52e0b0000 pid=2862 execve guuid=0a837047-1b00-0000-04b5-c4f5470b0000 pid=2887 /usr/bin/chmod guuid=6ece2326-1b00-0000-04b5-c4f5f30a0000 pid=2803->guuid=0a837047-1b00-0000-04b5-c4f5470b0000 pid=2887 execve guuid=ae7dd147-1b00-0000-04b5-c4f5490b0000 pid=2889 /usr/bin/dash guuid=6ece2326-1b00-0000-04b5-c4f5f30a0000 pid=2803->guuid=ae7dd147-1b00-0000-04b5-c4f5490b0000 pid=2889 clone guuid=4089ab48-1b00-0000-04b5-c4f54c0b0000 pid=2892 /usr/bin/wget net send-data write-file guuid=6ece2326-1b00-0000-04b5-c4f5f30a0000 pid=2803->guuid=4089ab48-1b00-0000-04b5-c4f54c0b0000 pid=2892 execve guuid=f693d64d-1b00-0000-04b5-c4f55a0b0000 pid=2906 /usr/bin/chmod guuid=6ece2326-1b00-0000-04b5-c4f5f30a0000 pid=2803->guuid=f693d64d-1b00-0000-04b5-c4f55a0b0000 pid=2906 execve guuid=1da9364e-1b00-0000-04b5-c4f55c0b0000 pid=2908 /usr/bin/dash guuid=6ece2326-1b00-0000-04b5-c4f5f30a0000 pid=2803->guuid=1da9364e-1b00-0000-04b5-c4f55c0b0000 pid=2908 clone guuid=f08e4150-1b00-0000-04b5-c4f5610b0000 pid=2913 /usr/bin/wget net send-data write-file guuid=6ece2326-1b00-0000-04b5-c4f5f30a0000 pid=2803->guuid=f08e4150-1b00-0000-04b5-c4f5610b0000 pid=2913 execve guuid=2fd47a53-1b00-0000-04b5-c4f5680b0000 pid=2920 /usr/bin/chmod guuid=6ece2326-1b00-0000-04b5-c4f5f30a0000 pid=2803->guuid=2fd47a53-1b00-0000-04b5-c4f5680b0000 pid=2920 execve guuid=d127bc53-1b00-0000-04b5-c4f5690b0000 pid=2921 /usr/bin/dash guuid=6ece2326-1b00-0000-04b5-c4f5f30a0000 pid=2803->guuid=d127bc53-1b00-0000-04b5-c4f5690b0000 pid=2921 clone guuid=319d4f54-1b00-0000-04b5-c4f56c0b0000 pid=2924 /usr/bin/wget net send-data write-file guuid=6ece2326-1b00-0000-04b5-c4f5f30a0000 pid=2803->guuid=319d4f54-1b00-0000-04b5-c4f56c0b0000 pid=2924 execve guuid=f7033657-1b00-0000-04b5-c4f5730b0000 pid=2931 /usr/bin/chmod guuid=6ece2326-1b00-0000-04b5-c4f5f30a0000 pid=2803->guuid=f7033657-1b00-0000-04b5-c4f5730b0000 pid=2931 execve guuid=0fec7b57-1b00-0000-04b5-c4f5750b0000 pid=2933 /usr/bin/dash guuid=6ece2326-1b00-0000-04b5-c4f5f30a0000 pid=2803->guuid=0fec7b57-1b00-0000-04b5-c4f5750b0000 pid=2933 clone guuid=99852058-1b00-0000-04b5-c4f5790b0000 pid=2937 /usr/bin/wget net send-data write-file guuid=6ece2326-1b00-0000-04b5-c4f5f30a0000 pid=2803->guuid=99852058-1b00-0000-04b5-c4f5790b0000 pid=2937 execve guuid=50960e5b-1b00-0000-04b5-c4f57f0b0000 pid=2943 /usr/bin/chmod guuid=6ece2326-1b00-0000-04b5-c4f5f30a0000 pid=2803->guuid=50960e5b-1b00-0000-04b5-c4f57f0b0000 pid=2943 execve guuid=904d745b-1b00-0000-04b5-c4f5810b0000 pid=2945 /usr/bin/dash guuid=6ece2326-1b00-0000-04b5-c4f5f30a0000 pid=2803->guuid=904d745b-1b00-0000-04b5-c4f5810b0000 pid=2945 clone guuid=1030025c-1b00-0000-04b5-c4f5850b0000 pid=2949 /usr/bin/wget net send-data guuid=6ece2326-1b00-0000-04b5-c4f5f30a0000 pid=2803->guuid=1030025c-1b00-0000-04b5-c4f5850b0000 pid=2949 execve guuid=6268da5d-1b00-0000-04b5-c4f5890b0000 pid=2953 /usr/bin/chmod guuid=6ece2326-1b00-0000-04b5-c4f5f30a0000 pid=2803->guuid=6268da5d-1b00-0000-04b5-c4f5890b0000 pid=2953 execve guuid=755f715e-1b00-0000-04b5-c4f58a0b0000 pid=2954 /usr/bin/dash guuid=6ece2326-1b00-0000-04b5-c4f5f30a0000 pid=2803->guuid=755f715e-1b00-0000-04b5-c4f58a0b0000 pid=2954 clone guuid=9ac57c5e-1b00-0000-04b5-c4f58b0b0000 pid=2955 /usr/bin/wget net send-data write-file guuid=6ece2326-1b00-0000-04b5-c4f5f30a0000 pid=2803->guuid=9ac57c5e-1b00-0000-04b5-c4f58b0b0000 pid=2955 execve guuid=91dd0462-1b00-0000-04b5-c4f58c0b0000 pid=2956 /usr/bin/chmod guuid=6ece2326-1b00-0000-04b5-c4f5f30a0000 pid=2803->guuid=91dd0462-1b00-0000-04b5-c4f58c0b0000 pid=2956 execve guuid=e9176162-1b00-0000-04b5-c4f58d0b0000 pid=2957 /home/sandbox/main_x86 delete-file net guuid=6ece2326-1b00-0000-04b5-c4f5f30a0000 pid=2803->guuid=e9176162-1b00-0000-04b5-c4f58d0b0000 pid=2957 execve guuid=c3719862-1b00-0000-04b5-c4f58f0b0000 pid=2959 /usr/bin/wget net send-data guuid=6ece2326-1b00-0000-04b5-c4f5f30a0000 pid=2803->guuid=c3719862-1b00-0000-04b5-c4f58f0b0000 pid=2959 execve guuid=dbd52e65-1b00-0000-04b5-c4f5920b0000 pid=2962 /usr/bin/chmod guuid=6ece2326-1b00-0000-04b5-c4f5f30a0000 pid=2803->guuid=dbd52e65-1b00-0000-04b5-c4f5920b0000 pid=2962 execve guuid=63eb7665-1b00-0000-04b5-c4f5940b0000 pid=2964 /home/sandbox/main_x86_64 guuid=6ece2326-1b00-0000-04b5-c4f5f30a0000 pid=2803->guuid=63eb7665-1b00-0000-04b5-c4f5940b0000 pid=2964 execve guuid=e7d65b66-1b00-0000-04b5-c4f5980b0000 pid=2968 /usr/bin/rm delete-file guuid=6ece2326-1b00-0000-04b5-c4f5f30a0000 pid=2803->guuid=e7d65b66-1b00-0000-04b5-c4f5980b0000 pid=2968 execve 53991375-1b28-53bc-a2e5-f05076b69828 31.59.58.26:80 guuid=293a7926-1b00-0000-04b5-c4f5f50a0000 pid=2805->53991375-1b28-53bc-a2e5-f05076b69828 send: 134B guuid=4572132e-1b00-0000-04b5-c4f5050b0000 pid=2821->53991375-1b28-53bc-a2e5-f05076b69828 send: 135B guuid=173fcb35-1b00-0000-04b5-c4f5170b0000 pid=2839->53991375-1b28-53bc-a2e5-f05076b69828 send: 135B guuid=b218eb39-1b00-0000-04b5-c4f5220b0000 pid=2850->53991375-1b28-53bc-a2e5-f05076b69828 send: 135B guuid=fcf4e03e-1b00-0000-04b5-c4f52e0b0000 pid=2862->53991375-1b28-53bc-a2e5-f05076b69828 send: 135B guuid=4089ab48-1b00-0000-04b5-c4f54c0b0000 pid=2892->53991375-1b28-53bc-a2e5-f05076b69828 send: 135B guuid=f08e4150-1b00-0000-04b5-c4f5610b0000 pid=2913->53991375-1b28-53bc-a2e5-f05076b69828 send: 135B guuid=319d4f54-1b00-0000-04b5-c4f56c0b0000 pid=2924->53991375-1b28-53bc-a2e5-f05076b69828 send: 134B guuid=99852058-1b00-0000-04b5-c4f5790b0000 pid=2937->53991375-1b28-53bc-a2e5-f05076b69828 send: 134B guuid=1030025c-1b00-0000-04b5-c4f5850b0000 pid=2949->53991375-1b28-53bc-a2e5-f05076b69828 send: 134B guuid=9ac57c5e-1b00-0000-04b5-c4f58b0b0000 pid=2955->53991375-1b28-53bc-a2e5-f05076b69828 send: 134B 8b0a01dc-0728-52c1-8024-c4ba7801b8d6 8.8.8.8:53 guuid=e9176162-1b00-0000-04b5-c4f58d0b0000 pid=2957->8b0a01dc-0728-52c1-8024-c4ba7801b8d6 con guuid=51478f62-1b00-0000-04b5-c4f58e0b0000 pid=2958 /home/sandbox/main_x86 dns net send-data zombie guuid=e9176162-1b00-0000-04b5-c4f58d0b0000 pid=2957->guuid=51478f62-1b00-0000-04b5-c4f58e0b0000 pid=2958 clone guuid=51478f62-1b00-0000-04b5-c4f58e0b0000 pid=2958->8b0a01dc-0728-52c1-8024-c4ba7801b8d6 send: 32B e0479097-b2f2-5f0c-a59d-d6eea8794184 kidlipsy.cloud:1995 guuid=51478f62-1b00-0000-04b5-c4f58e0b0000 pid=2958->e0479097-b2f2-5f0c-a59d-d6eea8794184 send: 14B guuid=2835ac62-1b00-0000-04b5-c4f5900b0000 pid=2960 /home/sandbox/main_x86 guuid=51478f62-1b00-0000-04b5-c4f58e0b0000 pid=2958->guuid=2835ac62-1b00-0000-04b5-c4f5900b0000 pid=2960 clone 204aeaf0-656b-5a7c-b9e7-9fdfeeb2e3d3 kidlipsy.cloud:80 guuid=c3719862-1b00-0000-04b5-c4f58f0b0000 pid=2959->204aeaf0-656b-5a7c-b9e7-9fdfeeb2e3d3 send: 137B
Verdict:
Malicious
Threat:
Trojan-Downloader.Shell.Agent
Threat name:
Document-HTML.Trojan.Vigorf
Status:
Malicious
First seen:
2026-01-11 06:20:51 UTC
File Type:
Text (Shell)
AV detection:
14 of 24 (58.33%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Modifies registry class
Suspicious use of SetWindowsHookEx
Enumerates physical storage devices
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:MAL_Linux_IoT_MultiArch_BotnetLoader_Generic
Author:Anish Bogati
Description:Technique-based detection of IoT/Linux botnet loader shell scripts downloading binaries from numeric IPs, chmodding, and executing multi-architecture payloads
Reference:MalwareBazaar sample lilin.sh

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh 6a4915bf4b390075f3e3c001e2157dafc4f82e5098ed22a16506f6d19d4a80ec

(this sample)

  
Delivery method
Distributed via web download

Comments