MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 72a217a20896f8ec3bfd865905ca0c95d7f86b1864c2bc8512e0be5b31173af8. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: 72a217a20896f8ec3bfd865905ca0c95d7f86b1864c2bc8512e0be5b31173af8
SHA3-384 hash: 07edcca7c801024ee970f79bbde6e9327d6300e5affde1525c95a1a11166333bf941cc84ad3329c2752ad3b911e7e2b1
SHA1 hash: b55744452c80232013f044cd7fd4238b9c86b444
MD5 hash: 9626f82c20a56156dd1dfba652347864
humanhash: violet-freddie-seventeen-whiskey
File name:l
Download: download sample
Signature Mirai
File size:675 bytes
First seen:2025-11-24 07:28:23 UTC
Last seen:Never
File type: sh
MIME type:text/plain
ssdeep 12:TJ+I8h8k6P8i8WH8F4ZX8Fq8FF8Fi/KP8Fnj8FH0LK7P86786sLKwx:TwIStCdnHmUXmqmFmiiPmjmSKLH2KQ
TLSH T1BC011EEE3AD1626685D98F52E6616A24B70F9ACDE4980EC896CF24B10E599017028E17
Magika txt
Reporter abuse_ch
Tags:mirai sh
URLMalware sample (SHA256 hash)SignatureTags
http://103.146.23.141/mips7496c6976b0e8438ea6f69e103f1af1e6d501a7fe26380914cbfc4010d6cf5b5 Miraielf geofenced mips mirai ua-wget USA
http://103.146.23.141/mpsl1e8f3cf5b4d3f882baf522d62bf9fc105fc34ad3562f0d2dca48dad26f5e2b26 Miraielf geofenced mips mirai ua-wget USA
http://103.146.23.141/arme6c563c09c5b0d3ece466e66741c73e24763c901a9511f2664128ba80ee653af Miraiarm elf geofenced mirai ua-wget USA
http://103.146.23.141/arm507ad16f0878b5af7f123753058da3660d83cac7a6244038fa82a5279ecbcdec7 Miraiarm elf geofenced mirai ua-wget USA
http://103.146.23.141/arm70feffdb13c3bce429c074cf1b5d10a33001b34a4e21d014d5f5151a9d01283f6 Miraiarm elf geofenced mirai ua-wget USA
http://103.146.23.141/x8686b6d6e282d0c889d7e97e6414672b37cbcb016d8f133212958a9b3af90c53e5 Miraielf mirai ua-wget

Intelligence


File Origin
# of uploads :
1
# of downloads :
47
Origin country :
DE DE
Vendor Threat Intelligence
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
busybox mirai
Verdict:
Malicious
File Type:
text
First seen:
2025-11-23T10:35:00Z UTC
Last seen:
2025-11-23T10:44:00Z UTC
Hits:
~10
Status:
terminated
Behavior Graph:
%3 guuid=3279ca40-1a00-0000-6527-73e181090000 pid=2433 /usr/bin/sudo guuid=b3786342-1a00-0000-6527-73e189090000 pid=2441 /tmp/sample.bin guuid=3279ca40-1a00-0000-6527-73e181090000 pid=2433->guuid=b3786342-1a00-0000-6527-73e189090000 pid=2441 execve guuid=c8b39a42-1a00-0000-6527-73e18a090000 pid=2442 /usr/bin/rm guuid=b3786342-1a00-0000-6527-73e189090000 pid=2441->guuid=c8b39a42-1a00-0000-6527-73e18a090000 pid=2442 execve guuid=e511db42-1a00-0000-6527-73e18c090000 pid=2444 /usr/bin/wget net send-data write-file guuid=b3786342-1a00-0000-6527-73e189090000 pid=2441->guuid=e511db42-1a00-0000-6527-73e18c090000 pid=2444 execve guuid=96fd7885-1a00-0000-6527-73e11f0a0000 pid=2591 /usr/bin/chmod guuid=b3786342-1a00-0000-6527-73e189090000 pid=2441->guuid=96fd7885-1a00-0000-6527-73e11f0a0000 pid=2591 execve guuid=3768c385-1a00-0000-6527-73e1210a0000 pid=2593 /usr/bin/dash guuid=b3786342-1a00-0000-6527-73e189090000 pid=2441->guuid=3768c385-1a00-0000-6527-73e1210a0000 pid=2593 clone guuid=1a546486-1a00-0000-6527-73e1250a0000 pid=2597 /usr/bin/wget net send-data write-file guuid=b3786342-1a00-0000-6527-73e189090000 pid=2441->guuid=1a546486-1a00-0000-6527-73e1250a0000 pid=2597 execve guuid=c57d34d8-1a00-0000-6527-73e1c30a0000 pid=2755 /usr/bin/chmod guuid=b3786342-1a00-0000-6527-73e189090000 pid=2441->guuid=c57d34d8-1a00-0000-6527-73e1c30a0000 pid=2755 execve guuid=bab0b1d8-1a00-0000-6527-73e1c50a0000 pid=2757 /usr/bin/dash guuid=b3786342-1a00-0000-6527-73e189090000 pid=2441->guuid=bab0b1d8-1a00-0000-6527-73e1c50a0000 pid=2757 clone guuid=4c77f8da-1a00-0000-6527-73e1c90a0000 pid=2761 /usr/bin/wget net send-data write-file guuid=b3786342-1a00-0000-6527-73e189090000 pid=2441->guuid=4c77f8da-1a00-0000-6527-73e1c90a0000 pid=2761 execve guuid=88dc9728-1b00-0000-6527-73e1260b0000 pid=2854 /usr/bin/chmod guuid=b3786342-1a00-0000-6527-73e189090000 pid=2441->guuid=88dc9728-1b00-0000-6527-73e1260b0000 pid=2854 execve guuid=f33b2329-1b00-0000-6527-73e1280b0000 pid=2856 /usr/bin/dash guuid=b3786342-1a00-0000-6527-73e189090000 pid=2441->guuid=f33b2329-1b00-0000-6527-73e1280b0000 pid=2856 clone guuid=0750582a-1b00-0000-6527-73e12c0b0000 pid=2860 /usr/bin/wget net send-data write-file guuid=b3786342-1a00-0000-6527-73e189090000 pid=2441->guuid=0750582a-1b00-0000-6527-73e12c0b0000 pid=2860 execve guuid=7430976f-1b00-0000-6527-73e17d0b0000 pid=2941 /usr/bin/chmod guuid=b3786342-1a00-0000-6527-73e189090000 pid=2441->guuid=7430976f-1b00-0000-6527-73e17d0b0000 pid=2941 execve guuid=92d73970-1b00-0000-6527-73e17e0b0000 pid=2942 /usr/bin/dash guuid=b3786342-1a00-0000-6527-73e189090000 pid=2441->guuid=92d73970-1b00-0000-6527-73e17e0b0000 pid=2942 clone guuid=6d7d6a72-1b00-0000-6527-73e1810b0000 pid=2945 /usr/bin/wget net send-data write-file guuid=b3786342-1a00-0000-6527-73e189090000 pid=2441->guuid=6d7d6a72-1b00-0000-6527-73e1810b0000 pid=2945 execve guuid=583c4bb7-1b00-0000-6527-73e10f0c0000 pid=3087 /usr/bin/chmod guuid=b3786342-1a00-0000-6527-73e189090000 pid=2441->guuid=583c4bb7-1b00-0000-6527-73e10f0c0000 pid=3087 execve guuid=9e7b86b7-1b00-0000-6527-73e1110c0000 pid=3089 /usr/bin/dash guuid=b3786342-1a00-0000-6527-73e189090000 pid=2441->guuid=9e7b86b7-1b00-0000-6527-73e1110c0000 pid=3089 clone guuid=d066f9b7-1b00-0000-6527-73e1140c0000 pid=3092 /usr/bin/wget net send-data write-file guuid=b3786342-1a00-0000-6527-73e189090000 pid=2441->guuid=d066f9b7-1b00-0000-6527-73e1140c0000 pid=3092 execve guuid=a624ea02-1c00-0000-6527-73e1a30c0000 pid=3235 /usr/bin/chmod guuid=b3786342-1a00-0000-6527-73e189090000 pid=2441->guuid=a624ea02-1c00-0000-6527-73e1a30c0000 pid=3235 execve guuid=ad724c03-1c00-0000-6527-73e1a40c0000 pid=3236 /usr/bin/dash guuid=b3786342-1a00-0000-6527-73e189090000 pid=2441->guuid=ad724c03-1c00-0000-6527-73e1a40c0000 pid=3236 clone c56865db-3b4b-54b6-a6ba-cee0ad256cff 103.146.23.141:80 guuid=e511db42-1a00-0000-6527-73e18c090000 pid=2444->c56865db-3b4b-54b6-a6ba-cee0ad256cff send: 133B guuid=1a546486-1a00-0000-6527-73e1250a0000 pid=2597->c56865db-3b4b-54b6-a6ba-cee0ad256cff send: 133B guuid=4c77f8da-1a00-0000-6527-73e1c90a0000 pid=2761->c56865db-3b4b-54b6-a6ba-cee0ad256cff send: 132B guuid=0750582a-1b00-0000-6527-73e12c0b0000 pid=2860->c56865db-3b4b-54b6-a6ba-cee0ad256cff send: 133B guuid=6d7d6a72-1b00-0000-6527-73e1810b0000 pid=2945->c56865db-3b4b-54b6-a6ba-cee0ad256cff send: 133B guuid=d066f9b7-1b00-0000-6527-73e1140c0000 pid=3092->c56865db-3b4b-54b6-a6ba-cee0ad256cff send: 132B
Threat name:
Linux.Worm.Mirai
Status:
Malicious
First seen:
2025-11-23 02:59:25 UTC
File Type:
Text (Shell)
AV detection:
8 of 36 (22.22%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Modifies registry class
Suspicious use of SetWindowsHookEx
Enumerates physical storage devices
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh 72a217a20896f8ec3bfd865905ca0c95d7f86b1864c2bc8512e0be5b31173af8

(this sample)

  
Delivery method
Distributed via web download

Comments