MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 6f6e8fbc39b6a884656a876369e76594a5c77a599761abc50fd583a76a2711c0. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 7


Intelligence 7 IOCs YARA 1 File information Comments

SHA256 hash: 6f6e8fbc39b6a884656a876369e76594a5c77a599761abc50fd583a76a2711c0
SHA3-384 hash: 62ada6ef6fac6b358ee54f0eb75a2682afb9e499dd00c12148c255f82ca7761d516bfa299ca3339c56867c571cec241b
SHA1 hash: 6890c9e99ef5639ef81be6b3d0895a039c21a119
MD5 hash: a46f7fbe62383dd0dde54ade5dd83b09
humanhash: monkey-mountain-tango-illinois
File name:cat.sh
Download: download sample
Signature Mirai
File size:2'104 bytes
First seen:2025-07-11 11:10:53 UTC
Last seen:2025-07-12 07:40:39 UTC
File type: sh
MIME type:text/x-shellscript
ssdeep 48:5YnIiYcc6QWQxlReRSs+A6e4i8kZKwHY3CCHChslIYl4Bl83:5YIiYcXQWQxlst+A6e4i8kZKwHY3Csjl
TLSH T1E541C0CD10F34452E1808E44F3FB824AF047D98A2ED78FE9ED1D3E65444AD60349DA29
Magika shell
Reporter abuse_ch
Tags:sh
URLMalware sample (SHA256 hash)SignatureTags
http://93.123.109.218/test/x86_640799d34500f933b78d36d7e2df399d9b775caad2c57720a592217357054e8f68 Miraielf mirai ua-wget
http://93.123.109.218/test/aarch649895cc4f07222ab988cd48fb176ab2449c31b7c1bfa50e7b0aacbe859c7bf863 Miraimirai sh ua-wget
http://93.123.109.218/test/m68k76a70e9ef68947e5707d900def98c0ac6700069f6a32cc8f7734ca377b11809d Miraielf mirai ua-wget
http://93.123.109.218/test/mips50ae0b14c6bc868c962b823b7ea6df03d199bef95e494922a1b415fddb06125b Miraielf mirai ua-wget
http://93.123.109.218/test/mipselb9237a8501a25adf856280eac04de2f4e061658664f8ec16019c2d79dbd66da4 Miraielf gafgyt mirai ua-wget
http://93.123.109.218/test/powerpca29feb48cc40af62f48c0a646467b23754f2518ae6fdf91bf50966d19bdc8461 Miraielf mirai ua-wget
http://93.123.109.218/test/sparc52deab119875c4fbcaa3a857d6170dd2f90f4a4cefb7ede4e0f481af87534fd6 Miraielf mirai ua-wget
http://93.123.109.218/test/sh4d1d7ad22e7d853e7faf86daaa06110b870fd43fd9bfede9afc3892b8673ff817 Miraielf mirai ua-wget
http://93.123.109.218/test/arc32da516341a337782c915114f45bdd54e79cdc55befd02b346b0054499aacddc Miraielf mirai ua-wget
http://93.123.109.218/test/cskyf8a5e083ceea1d00b5442c1c051131022fdddf8807ab4862048a75b2c8899bda Miraielf mirai ua-wget
http://93.123.109.218/test/i4869e7f464e3612ab5203d7d8de701f83a3410081bf85dba7215a7fac58bd47c3dc Miraielf mirai opendir ua-wget x86
http://93.123.109.218/test/armv4ldb751fd8db933b446652fa0b5f116c18c5790add5140e9302bb3a36bfd785e1c Miraielf mirai ua-wget
http://93.123.109.218/test/armv5l8bb974a5ec6b9311a56f4fa22ff38ccaefc80d3dbddd7616f8588cfd37e6caa7 Miraielf mirai ua-wget
http://93.123.109.218/test/armv6la70d6c5aa29c661fc8c25ac9c8658af00a90c631b65df818110cc960fa4ecb7f Miraielf mirai ua-wget
http://93.123.109.218/test/armv7l4651620d09b486b7f227efd44d2ce23c085e48cdb233efe8733683ac06656377 Miraielf mirai ua-wget

Intelligence


File Origin
# of uploads :
3
# of downloads :
27
Origin country :
DE DE
Vendor Threat Intelligence
Verdict:
Malicious
Score:
97.4%
Tags:
shellcode agent hype
Threat name:
Document-HTML.Downloader.Heuristic
Status:
Malicious
First seen:
2025-07-11 11:11:15 UTC
File Type:
Text (Shell)
AV detection:
14 of 38 (36.84%)
Threat level:
  2/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
defense_evasion discovery linux persistence
Behaviour
Reads runtime system information
System Network Configuration Discovery
Writes file to tmp directory
Changes its process name
Enumerates running processes
Modifies init.d
Modifies rc script
Write file to user bin folder
File and Directory Permissions Modification
Executes dropped EXE
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:ach_202412_suspect_bash_script
Author:abuse.ch
Description:Detects suspicious Linux bash scripts

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh 6f6e8fbc39b6a884656a876369e76594a5c77a599761abc50fd583a76a2711c0

(this sample)

  
Delivery method
Distributed via web download

Comments