MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 717817353fb05c63bf376db318e7d5b89aec4c5747ba29a449abcbc08cc5c8c7. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 7


Intelligence 7 IOCs YARA 1 File information Comments

SHA256 hash: 717817353fb05c63bf376db318e7d5b89aec4c5747ba29a449abcbc08cc5c8c7
SHA3-384 hash: d00036d2ef17640f1aaffbc50298b814802045f9de81ddcc97c4b47d072009b5a98e73c5475b8584a8f9868cf9f8180a
SHA1 hash: dd398cca070c76aa80943132edef07f300d67b60
MD5 hash: fbfa49e1a4db2ca64fc6c37e3be8f28d
humanhash: nine-shade-butter-pip
File name:ohshit.sh
Download: download sample
Signature Mirai
File size:2'910 bytes
First seen:2025-05-23 20:37:57 UTC
Last seen:Never
File type: sh
MIME type:text/x-shellscript
ssdeep 48:vP7g7N7hPp6GPgxzPPZKWPboUP7b7o7UPfe3bPw9RP3cgPUpVPxSOPF+CPufTPWS:vP7g7N7hPp6GPgxzPPZKWPboUP7b7o7o
TLSH T1B251B68753460D397D63EA53FAB643783085D46218EAEB9AEAC4FEE5434EF1431407A3
Magika shell
Reporter abuse_ch
Tags:mirai sh
URLMalware sample (SHA256 hash)SignatureTags
http://45.61.60.169/hiddenbin/boatnet.x86285cf96adba608069fbb849cfcd56e5bb13894bb0a0407456e28ea48b9b8db63 Miraicensys elf mirai opendir ua-wget
http://45.61.60.169/hiddenbin/boatnet.mips15ccba0508a3d3834f1c65be69996c90f0b80b80fd9e483a9693a641ccbafff1 Miraicensys elf mirai opendir ua-wget
http://45.61.60.169/hiddenbin/boatnet.arc4589f71d49e57c4b3589f474e85e9be17b6b8bacc642efd0e2e9efd78da7d421 Miraicensys elf mirai opendir ua-wget
http://45.61.60.169/hiddenbin/boatnet.i468n/an/an/a
http://45.61.60.169/hiddenbin/boatnet.i686n/an/an/a
http://45.61.60.169/hiddenbin/boatnet.x86_64n/an/an/a
http://45.61.60.169/hiddenbin/boatnet.mpsl41309e679b56fed0ddf55f1edac3155ea4d19a0d26f5363dfb5e736c1860569b Miraicensys elf mirai opendir ua-wget
http://45.61.60.169/hiddenbin/boatnet.armde86adc1bbf9baf401991a4095d1f3d0c68c5398badab2215e43d05f02d893eb Miraicensys elf mirai opendir ua-wget
http://45.61.60.169/hiddenbin/boatnet.arm5707f801776a19af641729da85fa70a0e7c5e462146b11700de02eb25353fed21 Miraicensys elf mirai opendir ua-wget
http://45.61.60.169/hiddenbin/boatnet.arm6d376f80675a5387e6330087d76d999390d4f4408c92e614adb0b9d61e28e9191 Miraicensys elf mirai opendir ua-wget
http://45.61.60.169/hiddenbin/boatnet.arm7bc4fd7de6715a42809a2a02e8506953ff227dd2fb010ce23e3136dc406acd9f9 Miraicensys elf mirai opendir ua-wget
http://45.61.60.169/hiddenbin/boatnet.ppccce13def8a6497ffcc7e7d012a691d8dcdfede933aed032f7efde03e6658d292 Miraicensys elf mirai opendir ua-wget
http://45.61.60.169/hiddenbin/boatnet.spc8bcd2c020ebdb13f5ecf3c104cb2045d4dffa8330c01c8baf22c19c4c25660bd Miraicensys elf mirai opendir ua-wget
http://45.61.60.169/hiddenbin/boatnet.m68k97606f05885c6175bb965699451cea872427bcfd4250e6d76905159db19dc27f Miraicensys elf mirai opendir ua-wget
http://45.61.60.169/hiddenbin/boatnet.sh42185e7946f37c9e62c1f3e90733c022375ace76b71fe12b7ee47bf04df976219 Miraicensys elf mirai opendir ua-wget

Intelligence


File Origin
# of uploads :
1
# of downloads :
109
Origin country :
DE DE
Vendor Threat Intelligence
Verdict:
Malicious
Score:
99.1%
Tags:
downloader agent virus
Threat name:
Linux.Downloader.Medusa
Status:
Malicious
First seen:
2025-05-23 20:38:39 UTC
File Type:
Text (Shell)
AV detection:
18 of 24 (75.00%)
Threat level:
  3/5
Result
Malware family:
Score:
  10/10
Tags:
family:mirai botnet:lzrd antivm botnet defense_evasion discovery linux upx
Behaviour
Reads runtime system information
System Network Configuration Discovery
Writes file to tmp directory
Checks CPU configuration
UPX packed file
Enumerates running processes
Writes file to system bin folder
File and Directory Permissions Modification
Executes dropped EXE
Modifies Watchdog functionality
Mirai
Mirai family
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Linux_Shellscript_Downloader
Author:albertzsigovits
Description:Generic Approach to Shellscript downloaders

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh 717817353fb05c63bf376db318e7d5b89aec4c5747ba29a449abcbc08cc5c8c7

(this sample)

  
Delivery method
Distributed via web download

Comments