MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 71a0aa26ecf371a881b316901016c971637dbd4c2cd9fb84c2bece9a1caf30d8. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 8


Intelligence 8 IOCs YARA 1 File information Comments

SHA256 hash: 71a0aa26ecf371a881b316901016c971637dbd4c2cd9fb84c2bece9a1caf30d8
SHA3-384 hash: 9053ba817b98fc7cbb04120c019ef3a7d0f237bea96c12f644fc9ae039665368f4085733782641a2db0e340b876eca66
SHA1 hash: 6954edbc3450ddddf495b3352d1049cd9c4c2563
MD5 hash: 5138e0380c5f3d5cafa34e613cb64dfd
humanhash: nine-artist-ink-kitten
File name:mao_http.sh
Download: download sample
Signature Mirai
File size:3'181 bytes
First seen:2026-01-31 16:41:07 UTC
Last seen:Never
File type: sh
MIME type:text/x-shellscript
ssdeep 96:g64Ko41YZMGeESwo6hMBmzqzI8W+kW864eEmSW:Is9
TLSH T1EE6117FD42A0BF93CCC5A54CBA1482E1B34B51F5FD72F63C9C684BAA0441B15748BAB9
TrID 70.0% (.SH) Linux/UNIX shell script (7000/1)
30.0% (.) Unix-like shebang (var.3) (gen) (3000/1)
Magika shell
Reporter abuse_ch
Tags:mirai sh
URLMalware sample (SHA256 hash)SignatureTags
http://185.242.3.127/bins/mao.x86_641b9e17462a47afb7ba79400f147f699ca70909f51a971bab80e20177ae024ef3 Miraielf mirai ua-wget
http://185.242.3.127/bins/mao.x86201c0b78693a3091d9a7e26aa7110c77beb13289ea5978f1edd4b1359567ea6e Miraielf mirai ua-wget
http://185.242.3.127/bins/mao.mipseb83574b4e79b73f2669e257643a06811b5a3d392ebc8597130bc8102b4a6b7f Miraielf mirai ua-wget
http://185.242.3.127/bins/mao.mpslc39ce9aeb58024de86d0df1aaed297a308cf59745d0c8589db81902cdb402bb5 Miraielf mirai ua-wget
http://185.242.3.127/bins/mao.arm37511f960894bb1bec92f792eb9a772a6a7926596155cbe3f60ca2b81a04e743 Miraielf mirai ua-wget
http://185.242.3.127/bins/mao.arm5f2eb51eaf6ec0d4e1293922014c2df9fd4fa62ade85fc2e47c56269d37c030ba Miraielf mirai ua-wget
http://185.242.3.127/bins/mao.arm665c1b5a4909e6f0bad16e48d4005f68d453936b72256564900537445582b0591 Miraielf mirai ua-wget
http://185.242.3.127/bins/mao.arm748737f8fa20358f195fb9670e6ee0444c9760f50f02bda7d78472dbfd0a08bab Miraielf mirai ua-wget
http://185.242.3.127/bins/mao.ppce66306f6a71cb948e0b5f4e55e5159a2380e8d61d3923380ce25264db244aeee Miraielf mirai ua-wget
http://185.242.3.127/bins/mao.m68ke7b3c9c00f79eca8e50a27c0462ff5f0cd3ac4148200508aa77b3eef21fd1cbb Miraielf mirai ua-wget
http://185.242.3.127/bins/mao.sh42fce8de8728f1291b308fa7f5d4f096e83e4bc90df63645d7de50e7c62463934 Miraielf mirai ua-wget
http://185.242.3.127/bins/mao.spce2b29014d4de16f628b0785438dd2de9a4003af819e7f9a266bd751415764b2b Miraielf mirai ua-wget
http://185.242.3.127/bins/mao.arc0cce20071a014da88feb55d7935d8525390f1bb31cc8259018f57ed1bb1292fd Miraielf mirai ua-wget
http://185.242.3.127/bins/mao.i68658c9220ae7d6e5e39d2fe77cb2a3d9df5929572ba2f8cab82e2b0e2f2ab5b13f Miraielf mirai ua-wget
http://185.242.3.127/bins/mao.i4860029fe67bf75b12aa1497f5302e59294502f57f59dd47d0c7d8e9a376794adf5 Miraielf mirai ua-wget

Intelligence


File Origin
# of uploads :
1
# of downloads :
48
Origin country :
DE DE
Vendor Threat Intelligence
No detections
Verdict:
Malicious
File Type:
unix shell
First seen:
2026-01-31T05:31:00Z UTC
Last seen:
2026-01-31T16:50:00Z UTC
Hits:
~10
Detections:
HEUR:Trojan-Downloader.Shell.Agent.gen HEUR:Trojan-Downloader.Shell.Agent.a
Status:
terminated
Behavior Graph:
%3 guuid=5ecfbda4-1900-0000-00c1-9db508090000 pid=2312 /usr/bin/sudo guuid=8f6ed1a6-1900-0000-00c1-9db50e090000 pid=2318 /tmp/sample.bin guuid=5ecfbda4-1900-0000-00c1-9db508090000 pid=2312->guuid=8f6ed1a6-1900-0000-00c1-9db50e090000 pid=2318 execve guuid=a6a320a7-1900-0000-00c1-9db510090000 pid=2320 /usr/bin/wget net send-data write-file guuid=8f6ed1a6-1900-0000-00c1-9db50e090000 pid=2318->guuid=a6a320a7-1900-0000-00c1-9db510090000 pid=2320 execve guuid=bbf23eac-1900-0000-00c1-9db518090000 pid=2328 /usr/bin/chmod guuid=8f6ed1a6-1900-0000-00c1-9db50e090000 pid=2318->guuid=bbf23eac-1900-0000-00c1-9db518090000 pid=2328 execve guuid=e0d5a6ac-1900-0000-00c1-9db51a090000 pid=2330 /tmp/mao_bot net guuid=8f6ed1a6-1900-0000-00c1-9db50e090000 pid=2318->guuid=e0d5a6ac-1900-0000-00c1-9db51a090000 pid=2330 execve guuid=c213c1af-1900-0000-00c1-9db524090000 pid=2340 /usr/bin/curl net send-data write-file guuid=8f6ed1a6-1900-0000-00c1-9db50e090000 pid=2318->guuid=c213c1af-1900-0000-00c1-9db524090000 pid=2340 execve guuid=2bba80c3-1900-0000-00c1-9db53f090000 pid=2367 /usr/bin/chmod guuid=8f6ed1a6-1900-0000-00c1-9db50e090000 pid=2318->guuid=2bba80c3-1900-0000-00c1-9db53f090000 pid=2367 execve guuid=6c4d2ec4-1900-0000-00c1-9db541090000 pid=2369 /tmp/mao_bot net guuid=8f6ed1a6-1900-0000-00c1-9db50e090000 pid=2318->guuid=6c4d2ec4-1900-0000-00c1-9db541090000 pid=2369 execve guuid=819259c7-1900-0000-00c1-9db54c090000 pid=2380 /usr/bin/wget net send-data write-file guuid=8f6ed1a6-1900-0000-00c1-9db50e090000 pid=2318->guuid=819259c7-1900-0000-00c1-9db54c090000 pid=2380 execve guuid=e11be8cb-1900-0000-00c1-9db557090000 pid=2391 /usr/bin/chmod guuid=8f6ed1a6-1900-0000-00c1-9db50e090000 pid=2318->guuid=e11be8cb-1900-0000-00c1-9db557090000 pid=2391 execve guuid=471d27cc-1900-0000-00c1-9db559090000 pid=2393 /tmp/mao_bot net guuid=8f6ed1a6-1900-0000-00c1-9db50e090000 pid=2318->guuid=471d27cc-1900-0000-00c1-9db559090000 pid=2393 execve 4961af98-ecbe-5da4-a0d2-a0d40ca0d25a 185.242.3.127:80 guuid=a6a320a7-1900-0000-00c1-9db510090000 pid=2320->4961af98-ecbe-5da4-a0d2-a0d40ca0d25a send: 143B 8b0a01dc-0728-52c1-8024-c4ba7801b8d6 8.8.8.8:53 guuid=e0d5a6ac-1900-0000-00c1-9db51a090000 pid=2330->8b0a01dc-0728-52c1-8024-c4ba7801b8d6 con guuid=c213c1af-1900-0000-00c1-9db524090000 pid=2340->4961af98-ecbe-5da4-a0d2-a0d40ca0d25a send: 92B guuid=6c4d2ec4-1900-0000-00c1-9db541090000 pid=2369->8b0a01dc-0728-52c1-8024-c4ba7801b8d6 con guuid=819259c7-1900-0000-00c1-9db54c090000 pid=2380->4961af98-ecbe-5da4-a0d2-a0d40ca0d25a send: 140B guuid=471d27cc-1900-0000-00c1-9db559090000 pid=2393->8b0a01dc-0728-52c1-8024-c4ba7801b8d6 con guuid=1bb648cc-1900-0000-00c1-9db55a090000 pid=2394 /tmp/mao_bot guuid=471d27cc-1900-0000-00c1-9db559090000 pid=2393->guuid=1bb648cc-1900-0000-00c1-9db55a090000 pid=2394 clone guuid=bd864ccc-1900-0000-00c1-9db55b090000 pid=2395 /tmp/mao_bot dns net send-data zombie guuid=471d27cc-1900-0000-00c1-9db559090000 pid=2393->guuid=bd864ccc-1900-0000-00c1-9db55b090000 pid=2395 clone guuid=bd864ccc-1900-0000-00c1-9db55b090000 pid=2395->8b0a01dc-0728-52c1-8024-c4ba7801b8d6 send: 29B a11803fe-5fd8-544d-b13b-84f58f3c81f8 mn.34509.su:25565 guuid=bd864ccc-1900-0000-00c1-9db55b090000 pid=2395->a11803fe-5fd8-544d-b13b-84f58f3c81f8 send: 14B guuid=35c75ccc-1900-0000-00c1-9db55c090000 pid=2396 /tmp/mao_bot guuid=bd864ccc-1900-0000-00c1-9db55b090000 pid=2395->guuid=35c75ccc-1900-0000-00c1-9db55c090000 pid=2396 clone guuid=ee8a61cc-1900-0000-00c1-9db55d090000 pid=2397 /tmp/mao_bot dns net send-data guuid=bd864ccc-1900-0000-00c1-9db55b090000 pid=2395->guuid=ee8a61cc-1900-0000-00c1-9db55d090000 pid=2397 clone guuid=ee8a61cc-1900-0000-00c1-9db55d090000 pid=2397->8b0a01dc-0728-52c1-8024-c4ba7801b8d6 send: 29B guuid=ee8a61cc-1900-0000-00c1-9db55d090000 pid=2397->a11803fe-5fd8-544d-b13b-84f58f3c81f8 send: 14B
Threat name:
Script-Shell.Trojan.Vigorf
Status:
Malicious
First seen:
2026-01-31 16:34:26 UTC
File Type:
Text (Shell)
AV detection:
12 of 38 (31.58%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:mirai antivm botnet defense_evasion discovery linux
Behaviour
Reads runtime system information
System Network Configuration Discovery
Writes file to tmp directory
Changes its process name
Checks CPU configuration
File and Directory Permissions Modification
Executes dropped EXE
Modifies Watchdog functionality
Mirai
Mirai family
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:MAL_Linux_IoT_MultiArch_BotnetLoader_Generic
Author:Anish Bogati
Description:Technique-based detection of IoT/Linux botnet loader shell scripts downloading binaries from numeric IPs, chmodding, and executing multi-architecture payloads
Reference:MalwareBazaar sample lilin.sh

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh 71a0aa26ecf371a881b316901016c971637dbd4c2cd9fb84c2bece9a1caf30d8

(this sample)

  
Delivery method
Distributed via web download

Comments