MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 74749630eecb7fb87f7a2e0190d0e6b1439786b91ae810fd9e8f5f4c9c2eb2f3. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 10


Intelligence 10 IOCs YARA 3 File information Comments

SHA256 hash: 74749630eecb7fb87f7a2e0190d0e6b1439786b91ae810fd9e8f5f4c9c2eb2f3
SHA3-384 hash: 55f633b47be9ff80118ba06790e8c52ee15dd503479c68f854d8ed53f26ef404e62a960b57a0914be5465ae1a8333957
SHA1 hash: 54d2c48783e2cb1b58e8ab4b419af9e928a8f111
MD5 hash: fec55da08d8a53d2b7b0b1f200da723d
humanhash: fillet-eleven-white-washington
File name:obs.sh
Download: download sample
Signature Mirai
File size:2'140 bytes
First seen:2026-01-11 06:13:57 UTC
Last seen:Never
File type: sh
MIME type:text/x-shellscript
ssdeep 24:IGyv9q7HsyYAVq7yjVjLcFEJyiuiOibigAyWWj4dLy1V1NIIijmksyow3KC6ryMJ:B2XS955d9ONFLOJCw9P
TLSH T1034134C923EE35359C9BC517336CC2E670E2C0E784C59A34B4F4ACB98D6EE9A3542D52
TrID 70.0% (.SH) Linux/UNIX shell script (7000/1)
30.0% (.) Unix-like shebang (var.3) (gen) (3000/1)
Magika shell
Reporter abuse_ch
Tags:mirai sh
URLMalware sample (SHA256 hash)SignatureTags
http://45.156.87.158/bins/vcimanagement.x86d4cf47ee0f2026092570352e93f56dfffdaff24b4aaf04b8b09e4a51fccaf051 Miraielf mirai ua-wget
http://45.156.87.158/bins/vcimanagement.mipsaa8bcf04548d9d53af361f02742fb4c359666ab617cf29e810fd9edd93fe4c73 Miraielf mirai ua-wget
http://45.156.87.158/bins/vcimanagement.mpsl85808c32a5fa073e7054f3eb74b6c34dd5980133574b43af12e62cd249689914 Miraielf mirai ua-wget
http://45.156.87.158/bins/vcimanagement.arma05827b8816b44e8de1c9b210ba3b4652a6a72736bc85f982b5d8ce60de60b90 Miraielf mirai ua-wget
http://45.156.87.158/bins/vcimanagement.arm50907b465ea2ba5e041dd7031decbb88d8e8629f3c87707325edcbc471d903720 Miraielf mirai ua-wget
http://45.156.87.158/bins/vcimanagement.arm62d206083be5df3ee9bc606b4e1e996d6b02f4b6085cf658dc73a5a969ec0617b Miraielf mirai ua-wget
http://45.156.87.158/bins/vcimanagement.arm79d3cdb640e6a9198b5ea2a8b0cc7bff48dd1b45704b19218d93faef5642021d7 Miraielf mirai ua-wget
http://45.156.87.158/bins/vcimanagement.ppc249d2551d78447301a56e212729603e74bf50e4fd0645889ab6077143039996f Miraielf mirai ua-wget
http://45.156.87.158/bins/vcimanagement.spce7ecac90156b8a5dc81d8653f04ce176c4565d859fc5265a8ce4093ecafa9e42 Miraielf mirai ua-wget

Intelligence


File Origin
# of uploads :
1
# of downloads :
38
Origin country :
DE DE
Vendor Threat Intelligence
No detections
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
evasive mirai
Result
Gathering data
Verdict:
Malicious
File Type:
unix shell
First seen:
2026-01-11T03:19:00Z UTC
Last seen:
2026-01-11T03:19:00Z UTC
Hits:
~10
Detections:
HEUR:Trojan-Downloader.Shell.Agent.p HEUR:Trojan-Downloader.Shell.Agent.gen HEUR:Trojan-Downloader.Shell.Agent.a
Threat name:
Linux.Downloader.Medusa
Status:
Malicious
First seen:
2026-01-11 06:03:53 UTC
File Type:
Text (Shell)
AV detection:
21 of 36 (58.33%)
Threat level:
  3/5
Result
Malware family:
Score:
  10/10
Tags:
family:echobot family:mirai antivm botnet defense_evasion discovery linux trojan
Behaviour
Reads runtime system information
System Network Configuration Discovery
Writes file to tmp directory
Changes its process name
Checks CPU configuration
Reads system network configuration
Enumerates active TCP sockets
Enumerates running processes
File and Directory Permissions Modification
Executes dropped EXE
Modifies Watchdog functionality
Contacts a large (253097) amount of remote hosts
Creates a large amount of network flows
Detected Echobot
Echobot
Echobot family
Mirai
Mirai family
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:ach_202412_suspect_bash_script
Author:abuse.ch
Description:Detects suspicious Linux bash scripts
Rule name:Linux_Shellscript_Downloader
Author:albertzsigovits
Description:Generic Approach to Shellscript downloaders
Rule name:MAL_Linux_IoT_MultiArch_BotnetLoader_Generic
Author:Anish Bogati
Description:Technique-based detection of IoT/Linux botnet loader shell scripts downloading binaries from numeric IPs, chmodding, and executing multi-architecture payloads
Reference:MalwareBazaar sample lilin.sh

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh 74749630eecb7fb87f7a2e0190d0e6b1439786b91ae810fd9e8f5f4c9c2eb2f3

(this sample)

  
Delivery method
Distributed via web download

Comments