MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 71a0aa26ecf371a881b316901016c971637dbd4c2cd9fb84c2bece9a1caf30d8. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 8


Intelligence 8 IOCs YARA 1 File information Comments

SHA256 hash: 71a0aa26ecf371a881b316901016c971637dbd4c2cd9fb84c2bece9a1caf30d8
SHA3-384 hash: 9053ba817b98fc7cbb04120c019ef3a7d0f237bea96c12f644fc9ae039665368f4085733782641a2db0e340b876eca66
SHA1 hash: 6954edbc3450ddddf495b3352d1049cd9c4c2563
MD5 hash: 5138e0380c5f3d5cafa34e613cb64dfd
humanhash: nine-artist-ink-kitten
File name:mao_http.sh
Download: download sample
Signature Mirai
File size:3'181 bytes
First seen:2026-01-31 16:41:07 UTC
Last seen:Never
File type: sh
MIME type:text/x-shellscript
ssdeep 96:g64Ko41YZMGeESwo6hMBmzqzI8W+kW864eEmSW:Is9
TLSH T1EE6117FD42A0BF93CCC5A54CBA1482E1B34B51F5FD72F63C9C684BAA0441B15748BAB9
TrID 70.0% (.SH) Linux/UNIX shell script (7000/1)
30.0% (.) Unix-like shebang (var.3) (gen) (3000/1)
Magika shell
Reporter abuse_ch
Tags:mirai sh
URLMalware sample (SHA256 hash)SignatureTags
http://185.242.3.127/bins/mao.x86_6480e2ffefac43ba12de92a71d3fb462576c6e13618faf4b1162198410a0f8f953 Miraielf ua-wget
http://185.242.3.127/bins/mao.x86b4811f5f075acbe9bda16a8b5ea29896ba145c3a8f134ab77adff8d4f2b419e0 Miraielf ua-wget
http://185.242.3.127/bins/mao.mips286bec72def7d4044f9b2a1ce818b88fa3e4f34d1fc99239daba332208ebc357 Miraielf ua-wget
http://185.242.3.127/bins/mao.mpsl1e6a4ee419d25c51719fc42649d8dace40a9baba3f5d76ce46a9816fb73e5eb1 Miraielf ua-wget
http://185.242.3.127/bins/mao.arm21fd5b0561383fa90237da3d6affa587530664784e39f7e5896efa144c28e679 Miraielf ua-wget
http://185.242.3.127/bins/mao.arm5a1cf80d0816c77f25ef181424cd3b806898d6657f2226791e672d20c2a725305 Miraielf ua-wget
http://185.242.3.127/bins/mao.arm654a8965b645fd70a21c5883c49d4da0e33bbabf8ed08f73ad8f8d70d5c4cab3c Miraielf ua-wget
http://185.242.3.127/bins/mao.arm79598019e3b3d919d7df0e26ad0dcc12d95a6314fc7b3dbfc627bd0eb70437a3e Miraielf ua-wget
http://185.242.3.127/bins/mao.ppcb1e0eca2d77f3d2295c9fa4c44001fd9d4e48df7b10aa25b5cad01f61be9dda7 Miraielf ua-wget
http://185.242.3.127/bins/mao.m68k5a85876c444eb38221bec627bb6887cf041e4f4aeea4e5117f04121ee88a59d1 Miraielf ua-wget
http://185.242.3.127/bins/mao.sh477e020fefb70aaca3863a0041041cf9a597465ab1d357b07ad015876fbf23fab Miraielf ua-wget
http://185.242.3.127/bins/mao.spc6b096d6a6ff4ad70aa27c1e7f1bee577aec33e259639599fc38b12ce175e07ff Miraielf ua-wget
http://185.242.3.127/bins/mao.arcb9373f4df561e2be8ec80117331d22d9efd546c9d51865b66743a69c77ce8121 Miraielf ua-wget
http://185.242.3.127/bins/mao.i6862b541bff6d90991ed882c039587e3623acecc9c3c32a522b69a496bc50afbe30 Miraielf ua-wget
http://185.242.3.127/bins/mao.i4867ca1830b7217d38b4b596f0146c8a5f0107c5ec4ca25f1e3e8f37bc8103ba2d4 Miraielf ua-wget

Intelligence


File Origin
# of uploads :
1
# of downloads :
39
Origin country :
DE DE
Vendor Threat Intelligence
No detections
Verdict:
Malicious
File Type:
unix shell
First seen:
2026-01-31T05:31:00Z UTC
Last seen:
2026-01-31T16:50:00Z UTC
Hits:
~10
Detections:
HEUR:Trojan-Downloader.Shell.Agent.gen HEUR:Trojan-Downloader.Shell.Agent.a
Status:
terminated
Behavior Graph:
%3 guuid=5ecfbda4-1900-0000-00c1-9db508090000 pid=2312 /usr/bin/sudo guuid=8f6ed1a6-1900-0000-00c1-9db50e090000 pid=2318 /tmp/sample.bin guuid=5ecfbda4-1900-0000-00c1-9db508090000 pid=2312->guuid=8f6ed1a6-1900-0000-00c1-9db50e090000 pid=2318 execve guuid=a6a320a7-1900-0000-00c1-9db510090000 pid=2320 /usr/bin/wget net send-data write-file guuid=8f6ed1a6-1900-0000-00c1-9db50e090000 pid=2318->guuid=a6a320a7-1900-0000-00c1-9db510090000 pid=2320 execve guuid=bbf23eac-1900-0000-00c1-9db518090000 pid=2328 /usr/bin/chmod guuid=8f6ed1a6-1900-0000-00c1-9db50e090000 pid=2318->guuid=bbf23eac-1900-0000-00c1-9db518090000 pid=2328 execve guuid=e0d5a6ac-1900-0000-00c1-9db51a090000 pid=2330 /tmp/mao_bot net guuid=8f6ed1a6-1900-0000-00c1-9db50e090000 pid=2318->guuid=e0d5a6ac-1900-0000-00c1-9db51a090000 pid=2330 execve guuid=c213c1af-1900-0000-00c1-9db524090000 pid=2340 /usr/bin/curl net send-data write-file guuid=8f6ed1a6-1900-0000-00c1-9db50e090000 pid=2318->guuid=c213c1af-1900-0000-00c1-9db524090000 pid=2340 execve guuid=2bba80c3-1900-0000-00c1-9db53f090000 pid=2367 /usr/bin/chmod guuid=8f6ed1a6-1900-0000-00c1-9db50e090000 pid=2318->guuid=2bba80c3-1900-0000-00c1-9db53f090000 pid=2367 execve guuid=6c4d2ec4-1900-0000-00c1-9db541090000 pid=2369 /tmp/mao_bot net guuid=8f6ed1a6-1900-0000-00c1-9db50e090000 pid=2318->guuid=6c4d2ec4-1900-0000-00c1-9db541090000 pid=2369 execve guuid=819259c7-1900-0000-00c1-9db54c090000 pid=2380 /usr/bin/wget net send-data write-file guuid=8f6ed1a6-1900-0000-00c1-9db50e090000 pid=2318->guuid=819259c7-1900-0000-00c1-9db54c090000 pid=2380 execve guuid=e11be8cb-1900-0000-00c1-9db557090000 pid=2391 /usr/bin/chmod guuid=8f6ed1a6-1900-0000-00c1-9db50e090000 pid=2318->guuid=e11be8cb-1900-0000-00c1-9db557090000 pid=2391 execve guuid=471d27cc-1900-0000-00c1-9db559090000 pid=2393 /tmp/mao_bot net guuid=8f6ed1a6-1900-0000-00c1-9db50e090000 pid=2318->guuid=471d27cc-1900-0000-00c1-9db559090000 pid=2393 execve 4961af98-ecbe-5da4-a0d2-a0d40ca0d25a 185.242.3.127:80 guuid=a6a320a7-1900-0000-00c1-9db510090000 pid=2320->4961af98-ecbe-5da4-a0d2-a0d40ca0d25a send: 143B 8b0a01dc-0728-52c1-8024-c4ba7801b8d6 8.8.8.8:53 guuid=e0d5a6ac-1900-0000-00c1-9db51a090000 pid=2330->8b0a01dc-0728-52c1-8024-c4ba7801b8d6 con guuid=c213c1af-1900-0000-00c1-9db524090000 pid=2340->4961af98-ecbe-5da4-a0d2-a0d40ca0d25a send: 92B guuid=6c4d2ec4-1900-0000-00c1-9db541090000 pid=2369->8b0a01dc-0728-52c1-8024-c4ba7801b8d6 con guuid=819259c7-1900-0000-00c1-9db54c090000 pid=2380->4961af98-ecbe-5da4-a0d2-a0d40ca0d25a send: 140B guuid=471d27cc-1900-0000-00c1-9db559090000 pid=2393->8b0a01dc-0728-52c1-8024-c4ba7801b8d6 con guuid=1bb648cc-1900-0000-00c1-9db55a090000 pid=2394 /tmp/mao_bot guuid=471d27cc-1900-0000-00c1-9db559090000 pid=2393->guuid=1bb648cc-1900-0000-00c1-9db55a090000 pid=2394 clone guuid=bd864ccc-1900-0000-00c1-9db55b090000 pid=2395 /tmp/mao_bot dns net send-data zombie guuid=471d27cc-1900-0000-00c1-9db559090000 pid=2393->guuid=bd864ccc-1900-0000-00c1-9db55b090000 pid=2395 clone guuid=bd864ccc-1900-0000-00c1-9db55b090000 pid=2395->8b0a01dc-0728-52c1-8024-c4ba7801b8d6 send: 29B a11803fe-5fd8-544d-b13b-84f58f3c81f8 mn.34509.su:25565 guuid=bd864ccc-1900-0000-00c1-9db55b090000 pid=2395->a11803fe-5fd8-544d-b13b-84f58f3c81f8 send: 14B guuid=35c75ccc-1900-0000-00c1-9db55c090000 pid=2396 /tmp/mao_bot guuid=bd864ccc-1900-0000-00c1-9db55b090000 pid=2395->guuid=35c75ccc-1900-0000-00c1-9db55c090000 pid=2396 clone guuid=ee8a61cc-1900-0000-00c1-9db55d090000 pid=2397 /tmp/mao_bot dns net send-data guuid=bd864ccc-1900-0000-00c1-9db55b090000 pid=2395->guuid=ee8a61cc-1900-0000-00c1-9db55d090000 pid=2397 clone guuid=ee8a61cc-1900-0000-00c1-9db55d090000 pid=2397->8b0a01dc-0728-52c1-8024-c4ba7801b8d6 send: 29B guuid=ee8a61cc-1900-0000-00c1-9db55d090000 pid=2397->a11803fe-5fd8-544d-b13b-84f58f3c81f8 send: 14B
Threat name:
Script-Shell.Worm.Mirai
Status:
Malicious
First seen:
2026-01-31 16:34:26 UTC
File Type:
Text (Shell)
AV detection:
10 of 36 (27.78%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:mirai antivm botnet defense_evasion discovery linux
Behaviour
Reads runtime system information
System Network Configuration Discovery
Writes file to tmp directory
Changes its process name
Checks CPU configuration
File and Directory Permissions Modification
Executes dropped EXE
Modifies Watchdog functionality
Mirai
Mirai family
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:MAL_Linux_IoT_MultiArch_BotnetLoader_Generic
Author:Anish Bogati
Description:Technique-based detection of IoT/Linux botnet loader shell scripts downloading binaries from numeric IPs, chmodding, and executing multi-architecture payloads
Reference:MalwareBazaar sample lilin.sh

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh 71a0aa26ecf371a881b316901016c971637dbd4c2cd9fb84c2bece9a1caf30d8

(this sample)

  
Delivery method
Distributed via web download

Comments