MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 6d38bec9fb45c22f4bd0359e2b762723be2bbbd2a5202c5da8b7740afcddf161. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 8


Intelligence 8 IOCs YARA 1 File information Comments

SHA256 hash: 6d38bec9fb45c22f4bd0359e2b762723be2bbbd2a5202c5da8b7740afcddf161
SHA3-384 hash: 27193860fcc50148f086bd434cd3d7ee41c1c2ca0f5df0b7fc85dffb8b478256846de0312462a018bddc7629a8d5046b
SHA1 hash: 988cf972368b1598dc4bf4257e6d775cc7acc642
MD5 hash: 88915bd48fdc13c514462f3f9555ffac
humanhash: kilo-jersey-arizona-spaghetti
File name:x.sh
Download: download sample
Signature Mirai
File size:878 bytes
First seen:2026-01-05 14:58:36 UTC
Last seen:Never
File type: sh
MIME type:text/x-shellscript
ssdeep 12:z0FZd6Td7BTa0bmf0FZET/na0bmf0FZliTtRTa0bm2:w3G7la6rOa6r7ga6x
TLSH T1AD1125D691A107F41DBAE923B0BAF5C4B69044CB59F2BD74E08CB4D11E4CC5571D8762
TrID 70.0% (.SH) Linux/UNIX shell script (7000/1)
30.0% (.) Unix-like shebang (var.3) (gen) (3000/1)
Magika shell
Reporter radixm46
Tags:miner sh
URLMalware sample (SHA256 hash)SignatureTags
http://176.97.210.242/x/x.x86_648946e27fde02523e175cccdaa694bf8cbb2884b4290e6fe9dab228f6c5a2d0b2 Miraielf mirai ua-wget
http://176.97.210.242/x/x.i68614bd6c4f11b6ca0b04150ce7890757160544d57ec8354aa7d52a7c73ac176e83 Miraielf mirai ua-wget
http://176.97.210.242/x/x.aarch64a75ead9ca6cf03f44ed1d4f669e2c65d88bacc3b1ec572c1c778c79357bc6660 Miraielf mirai ua-wget

Intelligence


File Origin
# of uploads :
1
# of downloads :
57
Origin country :
JP JP
Vendor Threat Intelligence
No detections
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
medusa mirai
Verdict:
Malicious
File Type:
unix shell
First seen:
2026-01-05T12:05:00Z UTC
Last seen:
2026-01-07T12:48:00Z UTC
Hits:
~100
Detections:
HEUR:Trojan-Downloader.Shell.Agent.p HEUR:Trojan-Downloader.Shell.Agent.a
Verdict:
Malicious
Threat:
Trojan-Downloader.Shell.Agent
Threat name:
Linux.Downloader.Morila
Status:
Malicious
First seen:
2026-01-05 14:59:15 UTC
File Type:
Text (Shell)
AV detection:
14 of 24 (58.33%)
Threat level:
  3/5
Result
Malware family:
n/a
Score:
  1/10
Tags:
linux
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:MAL_Linux_IoT_MultiArch_BotnetLoader_Generic
Author:Anish Bogati
Description:Technique-based detection of IoT/Linux botnet loader shell scripts downloading binaries from numeric IPs, chmodding, and executing multi-architecture payloads
Reference:MalwareBazaar sample lilin.sh

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh 6d38bec9fb45c22f4bd0359e2b762723be2bbbd2a5202c5da8b7740afcddf161

(this sample)

Comments