MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 7546ca09ea6c78d57f148f5ec216768ec71e20fa227223520d049f4c2f0cccdf. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: 7546ca09ea6c78d57f148f5ec216768ec71e20fa227223520d049f4c2f0cccdf
SHA3-384 hash: 1d3cf1b449b40eb89aeb57d46d9c1b97ba98d723f6447ccd04ab832926cbecbb06aaecd633fabea0e1af21fd86430bd2
SHA1 hash: 2b83e801cb54a6b2f263dd1f5c5b926a2df4b477
MD5 hash: 814361c7070478505eb4c33ce3f24bf0
humanhash: tennessee-music-carpet-vegan
File name:1.sh
Download: download sample
Signature Mirai
File size:2'312 bytes
First seen:2025-08-07 10:49:09 UTC
Last seen:Never
File type: sh
MIME type:text/x-shellscript
ssdeep 48:4peVupTpYlCp18ZipdMpimBpik942pNHN9w07BpkgmGWwpvUKpDptBpCKpBI:4suzYlCAZi83BBPzygDVN4
TLSH T18A41CBC42391D566E9EFD848B2FAC568E4C051C7AC8C5D0EC8DC58B84D6CF24F4DE6A0
Magika shell
Reporter abuse_ch
Tags:mirai sh
URLMalware sample (SHA256 hash)SignatureTags
http://176.65.148.51/binz/x86e42646aefc0b75ca58a717bd617416cecbd58920b9272b4ca10fae50567c8afb Miraielf geofenced mirai ua-wget USA x86
http://176.65.148.51/binz/mipsa5f13bf026e606955e587a4bf2dea73e5c033f3f3520a2aba99a98ea52f4a21a Miraielf geofenced mips mirai ua-wget USA
http://176.65.148.51/binz/i6863404d066a2f27151ef186011e028b812dc1eb78eb72325175b37e4982449fb71 Miraielf geofenced mirai ua-wget USA x86
http://176.65.148.51/binz/x86_64d20403f22e77ed5f9db906a9b20a5f19ffbb36f5f09330f42be0c73e80868c30 Miraielf geofenced mirai ua-wget USA x86
http://176.65.148.51/binz/mpslca076a61c194fc6c841bcfef76cfc93edb1d770cc8b08f1a1985a4b46589ce6a Miraielf geofenced mips mirai ua-wget USA
http://176.65.148.51/binz/arm45504169bbd3a51b71c9661048c096e4342f27f7df09801ece5610e2b749020b9 Miraiarm elf geofenced mirai ua-wget USA
http://176.65.148.51/binz/arm57989f401dcb54d3da3af6f50b2b1d07519a992b8889f06fb947f5155195a406b Miraiarm elf geofenced mirai ua-wget USA
http://176.65.148.51/binz/arm62c17165521acba08a923d382448e76a4fd7c82a6f87aee52d952c8ed3ece0b2e Miraiarm elf geofenced mirai ua-wget USA
http://176.65.148.51/binz/arm7b141e99de967d0d28a67f3a6393620795cdced642a605861f7f5d19bddf44566 Miraiarm elf geofenced mirai ua-wget USA
http://176.65.148.51/binz/ppc04fef010e8757a97eb12092ea4c1b2b137d4e06ed0185f57b1010abc704d844e Miraielf geofenced mirai PowerPC ua-wget USA
http://176.65.148.51/binz/m68kb9b5bd808f405493c668f763d4b4faf3d40efcc75ceea4381a2bd07e341a6ccf Miraielf geofenced m68k mirai ua-wget USA
http://176.65.148.51/binz/sh46d5db770240fda7b4a33d385aea65e9de4cc5f43defab32c49b215fd81f88b60 Miraielf geofenced mirai SuperH ua-wget USA

Intelligence


File Origin
# of uploads :
1
# of downloads :
33
Origin country :
DE DE
Vendor Threat Intelligence
Status:
terminated
Behavior Graph:
%3 guuid=590cd9e6-1900-0000-10c3-80da1f090000 pid=2335 /usr/bin/sudo guuid=e1c397ea-1900-0000-10c3-80da27090000 pid=2343 /tmp/sample.bin guuid=590cd9e6-1900-0000-10c3-80da1f090000 pid=2335->guuid=e1c397ea-1900-0000-10c3-80da27090000 pid=2343 execve guuid=b1591aeb-1900-0000-10c3-80da28090000 pid=2344 /usr/bin/wget net send-data write-file guuid=e1c397ea-1900-0000-10c3-80da27090000 pid=2343->guuid=b1591aeb-1900-0000-10c3-80da28090000 pid=2344 execve guuid=84a377ff-1900-0000-10c3-80da4b090000 pid=2379 /usr/bin/curl net send-data write-file guuid=e1c397ea-1900-0000-10c3-80da27090000 pid=2343->guuid=84a377ff-1900-0000-10c3-80da4b090000 pid=2379 execve guuid=0c152d1e-1a00-0000-10c3-80da7c090000 pid=2428 /usr/bin/cat guuid=e1c397ea-1900-0000-10c3-80da27090000 pid=2343->guuid=0c152d1e-1a00-0000-10c3-80da7c090000 pid=2428 execve guuid=d672861e-1a00-0000-10c3-80da7d090000 pid=2429 /usr/bin/chmod guuid=e1c397ea-1900-0000-10c3-80da27090000 pid=2343->guuid=d672861e-1a00-0000-10c3-80da7d090000 pid=2429 execve guuid=7baecf1e-1a00-0000-10c3-80da7e090000 pid=2430 /run_x86 delete-file write-file guuid=e1c397ea-1900-0000-10c3-80da27090000 pid=2343->guuid=7baecf1e-1a00-0000-10c3-80da7e090000 pid=2430 execve guuid=c5673c1f-1a00-0000-10c3-80da80090000 pid=2432 /usr/bin/wget net send-data write-file guuid=e1c397ea-1900-0000-10c3-80da27090000 pid=2343->guuid=c5673c1f-1a00-0000-10c3-80da80090000 pid=2432 execve guuid=db9e4035-1a00-0000-10c3-80daa4090000 pid=2468 /usr/bin/curl net send-data write-file guuid=e1c397ea-1900-0000-10c3-80da27090000 pid=2343->guuid=db9e4035-1a00-0000-10c3-80daa4090000 pid=2468 execve guuid=8955e943-1a00-0000-10c3-80dabf090000 pid=2495 /usr/bin/cat guuid=e1c397ea-1900-0000-10c3-80da27090000 pid=2343->guuid=8955e943-1a00-0000-10c3-80dabf090000 pid=2495 execve guuid=9e065845-1a00-0000-10c3-80dac1090000 pid=2497 /usr/bin/chmod guuid=e1c397ea-1900-0000-10c3-80da27090000 pid=2343->guuid=9e065845-1a00-0000-10c3-80dac1090000 pid=2497 execve guuid=f5c6dd45-1a00-0000-10c3-80dac2090000 pid=2498 /usr/bin/dash guuid=e1c397ea-1900-0000-10c3-80da27090000 pid=2343->guuid=f5c6dd45-1a00-0000-10c3-80dac2090000 pid=2498 clone guuid=9da2f846-1a00-0000-10c3-80dac4090000 pid=2500 /usr/bin/wget net send-data write-file guuid=e1c397ea-1900-0000-10c3-80da27090000 pid=2343->guuid=9da2f846-1a00-0000-10c3-80dac4090000 pid=2500 execve guuid=41761254-1a00-0000-10c3-80dad4090000 pid=2516 /usr/bin/curl net guuid=e1c397ea-1900-0000-10c3-80da27090000 pid=2343->guuid=41761254-1a00-0000-10c3-80dad4090000 pid=2516 execve guuid=8f760059-1a00-0000-10c3-80dad5090000 pid=2517 /usr/bin/wget net guuid=e1c397ea-1900-0000-10c3-80da27090000 pid=2343->guuid=8f760059-1a00-0000-10c3-80dad5090000 pid=2517 execve guuid=60929b5a-1a00-0000-10c3-80dad7090000 pid=2519 /usr/bin/wget net guuid=e1c397ea-1900-0000-10c3-80da27090000 pid=2343->guuid=60929b5a-1a00-0000-10c3-80dad7090000 pid=2519 execve guuid=b6b4a05c-1a00-0000-10c3-80dad8090000 pid=2520 /usr/bin/wget net guuid=e1c397ea-1900-0000-10c3-80da27090000 pid=2343->guuid=b6b4a05c-1a00-0000-10c3-80dad8090000 pid=2520 execve guuid=8b9d755e-1a00-0000-10c3-80dada090000 pid=2522 /usr/bin/wget net guuid=e1c397ea-1900-0000-10c3-80da27090000 pid=2343->guuid=8b9d755e-1a00-0000-10c3-80dada090000 pid=2522 execve guuid=71d80361-1a00-0000-10c3-80dae1090000 pid=2529 /usr/bin/wget net guuid=e1c397ea-1900-0000-10c3-80da27090000 pid=2343->guuid=71d80361-1a00-0000-10c3-80dae1090000 pid=2529 execve guuid=de21c262-1a00-0000-10c3-80dae5090000 pid=2533 /usr/bin/wget net send-data write-file guuid=e1c397ea-1900-0000-10c3-80da27090000 pid=2343->guuid=de21c262-1a00-0000-10c3-80dae5090000 pid=2533 execve guuid=aca42d70-1a00-0000-10c3-80da000a0000 pid=2560 /usr/bin/curl net send-data write-file guuid=e1c397ea-1900-0000-10c3-80da27090000 pid=2343->guuid=aca42d70-1a00-0000-10c3-80da000a0000 pid=2560 execve guuid=3a7fed7e-1a00-0000-10c3-80da1c0a0000 pid=2588 /usr/bin/cat guuid=e1c397ea-1900-0000-10c3-80da27090000 pid=2343->guuid=3a7fed7e-1a00-0000-10c3-80da1c0a0000 pid=2588 execve guuid=09782e7f-1a00-0000-10c3-80da1e0a0000 pid=2590 /usr/bin/chmod guuid=e1c397ea-1900-0000-10c3-80da27090000 pid=2343->guuid=09782e7f-1a00-0000-10c3-80da1e0a0000 pid=2590 execve guuid=dccc657f-1a00-0000-10c3-80da200a0000 pid=2592 /usr/bin/dash guuid=e1c397ea-1900-0000-10c3-80da27090000 pid=2343->guuid=dccc657f-1a00-0000-10c3-80da200a0000 pid=2592 clone guuid=edc9f27f-1a00-0000-10c3-80da240a0000 pid=2596 /usr/bin/wget net send-data write-file guuid=e1c397ea-1900-0000-10c3-80da27090000 pid=2343->guuid=edc9f27f-1a00-0000-10c3-80da240a0000 pid=2596 execve guuid=787bc78b-1a00-0000-10c3-80da4c0a0000 pid=2636 /usr/bin/curl net send-data write-file guuid=e1c397ea-1900-0000-10c3-80da27090000 pid=2343->guuid=787bc78b-1a00-0000-10c3-80da4c0a0000 pid=2636 execve guuid=59a03298-1a00-0000-10c3-80da740a0000 pid=2676 /usr/bin/cat guuid=e1c397ea-1900-0000-10c3-80da27090000 pid=2343->guuid=59a03298-1a00-0000-10c3-80da740a0000 pid=2676 execve guuid=80507598-1a00-0000-10c3-80da750a0000 pid=2677 /usr/bin/chmod guuid=e1c397ea-1900-0000-10c3-80da27090000 pid=2343->guuid=80507598-1a00-0000-10c3-80da750a0000 pid=2677 execve guuid=95a8b098-1a00-0000-10c3-80da770a0000 pid=2679 /usr/bin/dash guuid=e1c397ea-1900-0000-10c3-80da27090000 pid=2343->guuid=95a8b098-1a00-0000-10c3-80da770a0000 pid=2679 clone guuid=88759b99-1a00-0000-10c3-80da7d0a0000 pid=2685 /usr/bin/wget net send-data write-file guuid=e1c397ea-1900-0000-10c3-80da27090000 pid=2343->guuid=88759b99-1a00-0000-10c3-80da7d0a0000 pid=2685 execve guuid=76c969bc-1a00-0000-10c3-80dae10a0000 pid=2785 /usr/bin/curl net send-data write-file guuid=e1c397ea-1900-0000-10c3-80da27090000 pid=2343->guuid=76c969bc-1a00-0000-10c3-80dae10a0000 pid=2785 execve guuid=46c63ece-1a00-0000-10c3-80da070b0000 pid=2823 /usr/bin/cat guuid=e1c397ea-1900-0000-10c3-80da27090000 pid=2343->guuid=46c63ece-1a00-0000-10c3-80da070b0000 pid=2823 execve guuid=34bcaace-1a00-0000-10c3-80da090b0000 pid=2825 /usr/bin/chmod guuid=e1c397ea-1900-0000-10c3-80da27090000 pid=2343->guuid=34bcaace-1a00-0000-10c3-80da090b0000 pid=2825 execve guuid=615a00cf-1a00-0000-10c3-80da0b0b0000 pid=2827 /usr/bin/dash guuid=e1c397ea-1900-0000-10c3-80da27090000 pid=2343->guuid=615a00cf-1a00-0000-10c3-80da0b0b0000 pid=2827 clone guuid=495a9ccf-1a00-0000-10c3-80da0e0b0000 pid=2830 /usr/bin/wget guuid=e1c397ea-1900-0000-10c3-80da27090000 pid=2343->guuid=495a9ccf-1a00-0000-10c3-80da0e0b0000 pid=2830 execve 4634a2b4-4d69-5051-a164-6ac00a5ebb57 176.65.148.51:80 guuid=b1591aeb-1900-0000-10c3-80da28090000 pid=2344->4634a2b4-4d69-5051-a164-6ac00a5ebb57 send: 136B guuid=84a377ff-1900-0000-10c3-80da4b090000 pid=2379->4634a2b4-4d69-5051-a164-6ac00a5ebb57 send: 85B guuid=a731331f-1a00-0000-10c3-80da7f090000 pid=2431 /run_x86 delete-file dns net send-data zombie guuid=7baecf1e-1a00-0000-10c3-80da7e090000 pid=2430->guuid=a731331f-1a00-0000-10c3-80da7f090000 pid=2431 clone 8b0a01dc-0728-52c1-8024-c4ba7801b8d6 8.8.8.8:53 guuid=a731331f-1a00-0000-10c3-80da7f090000 pid=2431->8b0a01dc-0728-52c1-8024-c4ba7801b8d6 send: 58B 980f7400-8bc5-547c-be06-2248b7e09ede eteryum.xyz:2211 guuid=a731331f-1a00-0000-10c3-80da7f090000 pid=2431->980f7400-8bc5-547c-be06-2248b7e09ede send: 14B guuid=4c32521f-1a00-0000-10c3-80da81090000 pid=2433 /run_x86 net write-file guuid=a731331f-1a00-0000-10c3-80da7f090000 pid=2431->guuid=4c32521f-1a00-0000-10c3-80da81090000 pid=2433 clone guuid=498a591f-1a00-0000-10c3-80da82090000 pid=2434 /run_x86 guuid=a731331f-1a00-0000-10c3-80da7f090000 pid=2431->guuid=498a591f-1a00-0000-10c3-80da82090000 pid=2434 clone bd5f8f16-6381-5f1a-860c-c7625f460e4c eteryum.xyz:80 guuid=c5673c1f-1a00-0000-10c3-80da80090000 pid=2432->bd5f8f16-6381-5f1a-860c-c7625f460e4c send: 137B 0fd48c33-ff91-5504-b7c5-e735d8c8db4d eteryum.xyz:7733 guuid=4c32521f-1a00-0000-10c3-80da81090000 pid=2433->0fd48c33-ff91-5504-b7c5-e735d8c8db4d con guuid=db9e4035-1a00-0000-10c3-80daa4090000 pid=2468->bd5f8f16-6381-5f1a-860c-c7625f460e4c send: 86B guuid=9da2f846-1a00-0000-10c3-80dac4090000 pid=2500->bd5f8f16-6381-5f1a-860c-c7625f460e4c send: 137B guuid=41761254-1a00-0000-10c3-80dad4090000 pid=2516->bd5f8f16-6381-5f1a-860c-c7625f460e4c con guuid=8f760059-1a00-0000-10c3-80dad5090000 pid=2517->bd5f8f16-6381-5f1a-860c-c7625f460e4c con guuid=60929b5a-1a00-0000-10c3-80dad7090000 pid=2519->bd5f8f16-6381-5f1a-860c-c7625f460e4c con guuid=b6b4a05c-1a00-0000-10c3-80dad8090000 pid=2520->bd5f8f16-6381-5f1a-860c-c7625f460e4c con guuid=8b9d755e-1a00-0000-10c3-80dada090000 pid=2522->bd5f8f16-6381-5f1a-860c-c7625f460e4c con guuid=71d80361-1a00-0000-10c3-80dae1090000 pid=2529->bd5f8f16-6381-5f1a-860c-c7625f460e4c con guuid=de21c262-1a00-0000-10c3-80dae5090000 pid=2533->bd5f8f16-6381-5f1a-860c-c7625f460e4c send: 137B guuid=aca42d70-1a00-0000-10c3-80da000a0000 pid=2560->bd5f8f16-6381-5f1a-860c-c7625f460e4c send: 86B guuid=edc9f27f-1a00-0000-10c3-80da240a0000 pid=2596->bd5f8f16-6381-5f1a-860c-c7625f460e4c send: 136B guuid=787bc78b-1a00-0000-10c3-80da4c0a0000 pid=2636->bd5f8f16-6381-5f1a-860c-c7625f460e4c send: 85B guuid=88759b99-1a00-0000-10c3-80da7d0a0000 pid=2685->bd5f8f16-6381-5f1a-860c-c7625f460e4c send: 137B guuid=76c969bc-1a00-0000-10c3-80dae10a0000 pid=2785->bd5f8f16-6381-5f1a-860c-c7625f460e4c send: 86B
Verdict:
Malicious
Threat:
HEUR:Trojan-Downloader.Shell.Agent
Threat name:
Linux.Trojan.Vigorf
Status:
Malicious
First seen:
2025-08-07 10:50:56 UTC
File Type:
Text (Shell)
AV detection:
12 of 23 (52.17%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:mirai botnet:botnet antivm botnet credential_access defense_evasion discovery linux
Behaviour
Reads runtime system information
System Network Configuration Discovery
Changes its process name
Checks CPU configuration
Reads process memory
Enumerates running processes
File and Directory Permissions Modification
Deletes itself
Executes dropped EXE
Mirai
Mirai family
Malware Config
C2 Extraction:
176.65.148.51
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh 7546ca09ea6c78d57f148f5ec216768ec71e20fa227223520d049f4c2f0cccdf

(this sample)

  
Delivery method
Distributed via web download

Comments