MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 6eadbe57e734adbb395b046f0125d73bb03979b35cef799e2cbb44c0d3447aab. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: 6eadbe57e734adbb395b046f0125d73bb03979b35cef799e2cbb44c0d3447aab
SHA3-384 hash: c216f5dc63823a7e4a9e01b171797171a149c788fa25affe5622fc52a3de7ad655cdbf338d9c9e8cd5da739819a20ef4
SHA1 hash: 64c2b74e7acf648cdb673653f927c611b2df0e2a
MD5 hash: 9474850297844f973885ee95c840e225
humanhash: violet-september-blossom-golf
File name:c.sh
Download: download sample
File size:1'293 bytes
First seen:2026-01-17 17:26:35 UTC
Last seen:Never
File type: sh
MIME type:text/plain
ssdeep 12:3J34Hv5U0gv5h8NINMPv53LKUmv5av5tHX+v50jv5VW7NGuv5HQTjZv5fzw+uv5e:3J34/NIKKANfkQTvzw+p6A
TLSH T1B3212C9D03E1718AEA130D9D6811C04EB3FEB3E7B7508650AECF5868E0ED2097635A75
Magika batch
Reporter abuse_ch
Tags:sh
URLMalware sample (SHA256 hash)SignatureTags
http://82.221.139.173:3712/bins/systemx64.armn/an/aarm elf geofenced mirai opendir ua-wget USA
http://82.221.139.173:3712/bins/systemx64.arm5d0a046b222fe4ae0ff4072031286b635d3c5792c6e7f3d729ad3fde5f2610111 Miraiarm elf geofenced mirai opendir ua-wget USA
http://82.221.139.173:3712/bins/systemx64.arm69551d007f16feaa1415db8c9d985c4cd5d2a541eaf6d6c28bac9ef61f2cc961a Miraiarm elf geofenced mirai opendir ua-wget USA
http://82.221.139.173:3712/bins/systemx64.arm7c827699ba7634075d1ea4653d1c23fb82474593ae3fe9425ff027ac15788ef6f Miraiarm elf geofenced mirai opendir ua-wget USA
http://82.221.139.173:3712/bins/systemx64.m68k4131732816118512336fd9c5724099454d6ca9414e6ceb7b8f0d73fb45117277 Miraielf geofenced m68k mirai opendir ua-wget USA
http://82.221.139.173:3712/bins/systemx64.mips11494a98fb150512d9bfe4961040bf5218816d6ef8ab3aee48fabf37e1f7c460 Miraielf geofenced mips mirai opendir ua-wget USA
http://82.221.139.173:3712/bins/systemx64.mpsl87e12a203756cd8102da0a2a44c8508dcee94986377e91eba9494825d73a5901 Miraielf geofenced mips mirai opendir ua-wget USA
http://82.221.139.173:3712/bins/systemx64.ppc87414ba748a9a31cd3ba69d4dd662c09295906a554373c80a5e540adf938c562 Miraielf geofenced mirai opendir PowerPC ua-wget USA
http://82.221.139.173:3712/bins/systemx64.sh41b5244ed477766385e2feb71fa9c99821a220cdbb7ab774173002d9b4baf73bd Miraielf geofenced mirai opendir SuperH ua-wget USA
http://82.221.139.173:3712/bins/systemx64.spcd714978225984dba91184dae9e885da2275c28f7c2e49898f18d74d041202b8d Miraielf geofenced mirai opendir sparc ua-wget USA
http://82.221.139.173:3712/bins/systemx64.x868c9a145421a24e42f8e493fd3b29d804a50f4e5fcada419dd23bcb4ffa9cf451 Miraielf geofenced mirai opendir ua-wget USA x86
http://82.221.139.173:3712/bins/systemx64.x86_64f1e6640dd2e7a1700e87b180a8afb8d0b26758d3a4b06786b330353a80e7e49d Miraielf geofenced mirai opendir ua-wget USA x86

Intelligence


File Origin
# of uploads :
1
# of downloads :
35
Origin country :
DE DE
Vendor Threat Intelligence
No detections
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
mirai
Verdict:
Malicious
File Type:
ps1
First seen:
2026-01-17T14:42:00Z UTC
Last seen:
2026-01-18T14:38:00Z UTC
Hits:
~10
Detections:
HEUR:Trojan-Downloader.Shell.Agent.cl HEUR:Backdoor.Linux.Mirai.h HEUR:Backdoor.Linux.Mirai.cw HEUR:Backdoor.Linux.Mirai.ba HEUR:Backdoor.Linux.Mirai.b
Status:
terminated
Behavior Graph:
%3 guuid=cefda3db-1a00-0000-60ff-4470a20a0000 pid=2722 /usr/bin/sudo guuid=5d9e94dd-1a00-0000-60ff-4470a30a0000 pid=2723 /tmp/sample.bin guuid=cefda3db-1a00-0000-60ff-4470a20a0000 pid=2722->guuid=5d9e94dd-1a00-0000-60ff-4470a30a0000 pid=2723 execve guuid=0fe254e3-1a00-0000-60ff-4470a40a0000 pid=2724 /usr/bin/curl net send-data guuid=5d9e94dd-1a00-0000-60ff-4470a30a0000 pid=2723->guuid=0fe254e3-1a00-0000-60ff-4470a40a0000 pid=2724 execve guuid=834c3ff8-1a00-0000-60ff-4470c70a0000 pid=2759 /usr/bin/chmod guuid=5d9e94dd-1a00-0000-60ff-4470a30a0000 pid=2723->guuid=834c3ff8-1a00-0000-60ff-4470c70a0000 pid=2759 execve guuid=8f35abf8-1a00-0000-60ff-4470c80a0000 pid=2760 /usr/bin/dash guuid=5d9e94dd-1a00-0000-60ff-4470a30a0000 pid=2723->guuid=8f35abf8-1a00-0000-60ff-4470c80a0000 pid=2760 clone guuid=9372bbf8-1a00-0000-60ff-4470c90a0000 pid=2761 /usr/bin/curl net send-data guuid=5d9e94dd-1a00-0000-60ff-4470a30a0000 pid=2723->guuid=9372bbf8-1a00-0000-60ff-4470c90a0000 pid=2761 execve guuid=60654a06-1b00-0000-60ff-4470e00a0000 pid=2784 /usr/bin/chmod guuid=5d9e94dd-1a00-0000-60ff-4470a30a0000 pid=2723->guuid=60654a06-1b00-0000-60ff-4470e00a0000 pid=2784 execve guuid=c84ba706-1b00-0000-60ff-4470e20a0000 pid=2786 /usr/bin/dash guuid=5d9e94dd-1a00-0000-60ff-4470a30a0000 pid=2723->guuid=c84ba706-1b00-0000-60ff-4470e20a0000 pid=2786 clone guuid=24fec906-1b00-0000-60ff-4470e30a0000 pid=2787 /usr/bin/curl net send-data guuid=5d9e94dd-1a00-0000-60ff-4470a30a0000 pid=2723->guuid=24fec906-1b00-0000-60ff-4470e30a0000 pid=2787 execve guuid=6f4bd917-1b00-0000-60ff-4470fc0a0000 pid=2812 /usr/bin/chmod guuid=5d9e94dd-1a00-0000-60ff-4470a30a0000 pid=2723->guuid=6f4bd917-1b00-0000-60ff-4470fc0a0000 pid=2812 execve guuid=af9e2d18-1b00-0000-60ff-4470fd0a0000 pid=2813 /usr/bin/dash guuid=5d9e94dd-1a00-0000-60ff-4470a30a0000 pid=2723->guuid=af9e2d18-1b00-0000-60ff-4470fd0a0000 pid=2813 clone guuid=69873318-1b00-0000-60ff-4470fe0a0000 pid=2814 /usr/bin/curl net send-data guuid=5d9e94dd-1a00-0000-60ff-4470a30a0000 pid=2723->guuid=69873318-1b00-0000-60ff-4470fe0a0000 pid=2814 execve guuid=30f1822a-1b00-0000-60ff-4470240b0000 pid=2852 /usr/bin/chmod guuid=5d9e94dd-1a00-0000-60ff-4470a30a0000 pid=2723->guuid=30f1822a-1b00-0000-60ff-4470240b0000 pid=2852 execve guuid=ce52d42a-1b00-0000-60ff-4470250b0000 pid=2853 /usr/bin/dash guuid=5d9e94dd-1a00-0000-60ff-4470a30a0000 pid=2723->guuid=ce52d42a-1b00-0000-60ff-4470250b0000 pid=2853 clone guuid=d55ee22a-1b00-0000-60ff-4470260b0000 pid=2854 /usr/bin/curl net send-data guuid=5d9e94dd-1a00-0000-60ff-4470a30a0000 pid=2723->guuid=d55ee22a-1b00-0000-60ff-4470260b0000 pid=2854 execve guuid=0d2d0f3e-1b00-0000-60ff-44705c0b0000 pid=2908 /usr/bin/chmod guuid=5d9e94dd-1a00-0000-60ff-4470a30a0000 pid=2723->guuid=0d2d0f3e-1b00-0000-60ff-44705c0b0000 pid=2908 execve guuid=b2ec653e-1b00-0000-60ff-44705e0b0000 pid=2910 /usr/bin/dash guuid=5d9e94dd-1a00-0000-60ff-4470a30a0000 pid=2723->guuid=b2ec653e-1b00-0000-60ff-44705e0b0000 pid=2910 clone guuid=d7886b3e-1b00-0000-60ff-44705f0b0000 pid=2911 /usr/bin/curl net send-data guuid=5d9e94dd-1a00-0000-60ff-4470a30a0000 pid=2723->guuid=d7886b3e-1b00-0000-60ff-44705f0b0000 pid=2911 execve guuid=96cb4351-1b00-0000-60ff-44707e0b0000 pid=2942 /usr/bin/chmod guuid=5d9e94dd-1a00-0000-60ff-4470a30a0000 pid=2723->guuid=96cb4351-1b00-0000-60ff-44707e0b0000 pid=2942 execve guuid=51b6fa51-1b00-0000-60ff-4470800b0000 pid=2944 /usr/bin/dash guuid=5d9e94dd-1a00-0000-60ff-4470a30a0000 pid=2723->guuid=51b6fa51-1b00-0000-60ff-4470800b0000 pid=2944 clone guuid=a4750752-1b00-0000-60ff-4470810b0000 pid=2945 /usr/bin/curl net send-data guuid=5d9e94dd-1a00-0000-60ff-4470a30a0000 pid=2723->guuid=a4750752-1b00-0000-60ff-4470810b0000 pid=2945 execve guuid=f4982c66-1b00-0000-60ff-4470ab0b0000 pid=2987 /usr/bin/chmod guuid=5d9e94dd-1a00-0000-60ff-4470a30a0000 pid=2723->guuid=f4982c66-1b00-0000-60ff-4470ab0b0000 pid=2987 execve guuid=d0f59366-1b00-0000-60ff-4470ac0b0000 pid=2988 /usr/bin/dash guuid=5d9e94dd-1a00-0000-60ff-4470a30a0000 pid=2723->guuid=d0f59366-1b00-0000-60ff-4470ac0b0000 pid=2988 clone guuid=fc479e66-1b00-0000-60ff-4470ae0b0000 pid=2990 /usr/bin/curl net send-data guuid=5d9e94dd-1a00-0000-60ff-4470a30a0000 pid=2723->guuid=fc479e66-1b00-0000-60ff-4470ae0b0000 pid=2990 execve guuid=53751977-1b00-0000-60ff-4470de0b0000 pid=3038 /usr/bin/chmod guuid=5d9e94dd-1a00-0000-60ff-4470a30a0000 pid=2723->guuid=53751977-1b00-0000-60ff-4470de0b0000 pid=3038 execve guuid=b5d85277-1b00-0000-60ff-4470df0b0000 pid=3039 /usr/bin/dash guuid=5d9e94dd-1a00-0000-60ff-4470a30a0000 pid=2723->guuid=b5d85277-1b00-0000-60ff-4470df0b0000 pid=3039 clone guuid=11305f77-1b00-0000-60ff-4470e10b0000 pid=3041 /usr/bin/curl net send-data guuid=5d9e94dd-1a00-0000-60ff-4470a30a0000 pid=2723->guuid=11305f77-1b00-0000-60ff-4470e10b0000 pid=3041 execve guuid=2014098a-1b00-0000-60ff-4470140c0000 pid=3092 /usr/bin/chmod guuid=5d9e94dd-1a00-0000-60ff-4470a30a0000 pid=2723->guuid=2014098a-1b00-0000-60ff-4470140c0000 pid=3092 execve guuid=f35d608a-1b00-0000-60ff-4470160c0000 pid=3094 /usr/bin/dash guuid=5d9e94dd-1a00-0000-60ff-4470a30a0000 pid=2723->guuid=f35d608a-1b00-0000-60ff-4470160c0000 pid=3094 clone guuid=1d696a8a-1b00-0000-60ff-4470180c0000 pid=3096 /usr/bin/curl net send-data guuid=5d9e94dd-1a00-0000-60ff-4470a30a0000 pid=2723->guuid=1d696a8a-1b00-0000-60ff-4470180c0000 pid=3096 execve guuid=12a21a9d-1b00-0000-60ff-4470500c0000 pid=3152 /usr/bin/chmod guuid=5d9e94dd-1a00-0000-60ff-4470a30a0000 pid=2723->guuid=12a21a9d-1b00-0000-60ff-4470500c0000 pid=3152 execve guuid=6be1579d-1b00-0000-60ff-4470520c0000 pid=3154 /usr/bin/dash guuid=5d9e94dd-1a00-0000-60ff-4470a30a0000 pid=2723->guuid=6be1579d-1b00-0000-60ff-4470520c0000 pid=3154 clone guuid=6234739d-1b00-0000-60ff-4470530c0000 pid=3155 /usr/bin/curl net send-data guuid=5d9e94dd-1a00-0000-60ff-4470a30a0000 pid=2723->guuid=6234739d-1b00-0000-60ff-4470530c0000 pid=3155 execve guuid=833eabad-1b00-0000-60ff-44707f0c0000 pid=3199 /usr/bin/chmod guuid=5d9e94dd-1a00-0000-60ff-4470a30a0000 pid=2723->guuid=833eabad-1b00-0000-60ff-44707f0c0000 pid=3199 execve guuid=488d1cae-1b00-0000-60ff-4470810c0000 pid=3201 /usr/bin/dash guuid=5d9e94dd-1a00-0000-60ff-4470a30a0000 pid=2723->guuid=488d1cae-1b00-0000-60ff-4470810c0000 pid=3201 clone guuid=8cec2bae-1b00-0000-60ff-4470820c0000 pid=3202 /usr/bin/curl net send-data guuid=5d9e94dd-1a00-0000-60ff-4470a30a0000 pid=2723->guuid=8cec2bae-1b00-0000-60ff-4470820c0000 pid=3202 execve guuid=34f8b0bf-1b00-0000-60ff-44708a0c0000 pid=3210 /usr/bin/chmod guuid=5d9e94dd-1a00-0000-60ff-4470a30a0000 pid=2723->guuid=34f8b0bf-1b00-0000-60ff-44708a0c0000 pid=3210 execve guuid=ba393fc0-1b00-0000-60ff-44708b0c0000 pid=3211 /usr/bin/dash guuid=5d9e94dd-1a00-0000-60ff-4470a30a0000 pid=2723->guuid=ba393fc0-1b00-0000-60ff-44708b0c0000 pid=3211 clone guuid=67fb4dc0-1b00-0000-60ff-44708c0c0000 pid=3212 /usr/bin/rm guuid=5d9e94dd-1a00-0000-60ff-4470a30a0000 pid=2723->guuid=67fb4dc0-1b00-0000-60ff-44708c0c0000 pid=3212 execve dd1ffe3e-f994-56b1-9da7-b199910e72c2 82.221.139.173:3712 guuid=0fe254e3-1a00-0000-60ff-4470a40a0000 pid=2724->dd1ffe3e-f994-56b1-9da7-b199910e72c2 send: 101B guuid=9372bbf8-1a00-0000-60ff-4470c90a0000 pid=2761->dd1ffe3e-f994-56b1-9da7-b199910e72c2 send: 102B guuid=24fec906-1b00-0000-60ff-4470e30a0000 pid=2787->dd1ffe3e-f994-56b1-9da7-b199910e72c2 send: 102B guuid=69873318-1b00-0000-60ff-4470fe0a0000 pid=2814->dd1ffe3e-f994-56b1-9da7-b199910e72c2 send: 102B guuid=d55ee22a-1b00-0000-60ff-4470260b0000 pid=2854->dd1ffe3e-f994-56b1-9da7-b199910e72c2 send: 102B guuid=d7886b3e-1b00-0000-60ff-44705f0b0000 pid=2911->dd1ffe3e-f994-56b1-9da7-b199910e72c2 send: 102B guuid=a4750752-1b00-0000-60ff-4470810b0000 pid=2945->dd1ffe3e-f994-56b1-9da7-b199910e72c2 send: 102B guuid=fc479e66-1b00-0000-60ff-4470ae0b0000 pid=2990->dd1ffe3e-f994-56b1-9da7-b199910e72c2 send: 101B guuid=11305f77-1b00-0000-60ff-4470e10b0000 pid=3041->dd1ffe3e-f994-56b1-9da7-b199910e72c2 send: 101B guuid=1d696a8a-1b00-0000-60ff-4470180c0000 pid=3096->dd1ffe3e-f994-56b1-9da7-b199910e72c2 send: 101B guuid=6234739d-1b00-0000-60ff-4470530c0000 pid=3155->dd1ffe3e-f994-56b1-9da7-b199910e72c2 send: 101B guuid=8cec2bae-1b00-0000-60ff-4470820c0000 pid=3202->dd1ffe3e-f994-56b1-9da7-b199910e72c2 send: 104B
Threat name:
Linux.Downloader.Generic
Status:
Suspicious
First seen:
2026-01-17 08:31:24 UTC
File Type:
Text (Shell)
AV detection:
12 of 38 (31.58%)
Threat level:
  3/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Modifies registry class
Suspicious use of SetWindowsHookEx
Enumerates physical storage devices
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

sh 6eadbe57e734adbb395b046f0125d73bb03979b35cef799e2cbb44c0d3447aab

(this sample)

  
Delivery method
Distributed via web download

Comments