MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 774aa045f5a70f77419a50ff5835718a8e96ed290eafb215fc56b876315eca4c. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 6


Intelligence 6 IOCs YARA 2 File information Comments

SHA256 hash: 774aa045f5a70f77419a50ff5835718a8e96ed290eafb215fc56b876315eca4c
SHA3-384 hash: 79ce18f41f745dddc96ecf4151feb38434d2fc419f5f91f224c65c8b17569028816389a643ab1171f539b710319dc813
SHA1 hash: 3a893f3e18f137058de4c8cd336c11cc1810f552
MD5 hash: 76d8a17fd94d4f4ba796553750040442
humanhash: west-twelve-ten-mississippi
File name:tvt.sh
Download: download sample
Signature Mirai
File size:1'165 bytes
First seen:2025-11-15 20:51:28 UTC
Last seen:Never
File type: sh
MIME type:text/plain
ssdeep 24:Ho1oWBfEENuC73EENuRUEENu7ZZyEENuMEENu89G:Ho1oGfE0uSE0uuE0u7ZZyE0uME0ub
TLSH T17621FBCF51D1C0212944C805B5EF89283A1DDF962FC3D69DE8592B1E64A8E15FC29F23
Magika shell
Reporter abuse_ch
Tags:mirai sh
URLMalware sample (SHA256 hash)SignatureTags
http://downloader.nvms9000.su/arm14883298489d57b2242533f561769e8f21737126e8560c4b9955dc701478c23e Mirai32-bit elf mirai Mozi
http://downloader.nvms9000.su/arm582ee72be70e8dce122910449268514083943892258ea9b9d21068e03286d03f8 Miraielf mirai ua-wget
http://downloader.nvms9000.su/arm75a469ba94c55f39fdf0656a0a1b98c988d699569397587d8e1141a0d928b9eea Miraielf mirai ua-wget
http://downloader.nvms9000.su/mips77637c28bd5ccda2ad3c90c2d34e879fa7e10f1abe04520e5bda11cd7ed69c8e Gafgyt32-bit elf gafgyt Mozi
http://downloader.nvms9000.su/mpslafe59ccdfac00527b2983101bc1e5d91361609b4753962e0cb2cc890b8a35d2f Gafgytelf gafgyt ua-wget
http://downloader.nvms9000.su/tvt.sh774aa045f5a70f77419a50ff5835718a8e96ed290eafb215fc56b876315eca4c Miraiascii sh ua-wget

Intelligence


File Origin
# of uploads :
1
# of downloads :
31
Origin country :
DE DE
Vendor Threat Intelligence
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
base64 busybox evasive
Verdict:
Malicious
File Type:
unix shell
First seen:
2025-11-15T18:36:00Z UTC
Last seen:
2025-11-16T10:19:00Z UTC
Hits:
~10
Status:
terminated
Behavior Graph:
%3 guuid=b21e5db1-1a00-0000-5c2f-68a2bd090000 pid=2493 /usr/bin/sudo guuid=d2b4e5b2-1a00-0000-5c2f-68a2c2090000 pid=2498 /tmp/sample.bin guuid=b21e5db1-1a00-0000-5c2f-68a2bd090000 pid=2493->guuid=d2b4e5b2-1a00-0000-5c2f-68a2c2090000 pid=2498 execve guuid=420c72b3-1a00-0000-5c2f-68a2c4090000 pid=2500 /usr/bin/cp guuid=d2b4e5b2-1a00-0000-5c2f-68a2c2090000 pid=2498->guuid=420c72b3-1a00-0000-5c2f-68a2c4090000 pid=2500 execve guuid=945608ba-1a00-0000-5c2f-68a2d2090000 pid=2514 /usr/bin/dash guuid=d2b4e5b2-1a00-0000-5c2f-68a2c2090000 pid=2498->guuid=945608ba-1a00-0000-5c2f-68a2d2090000 pid=2514 clone guuid=4027a7cc-1a00-0000-5c2f-68a2fa090000 pid=2554 /usr/bin/chmod guuid=d2b4e5b2-1a00-0000-5c2f-68a2c2090000 pid=2498->guuid=4027a7cc-1a00-0000-5c2f-68a2fa090000 pid=2554 execve guuid=437e24cd-1a00-0000-5c2f-68a2fb090000 pid=2555 /usr/bin/dash guuid=d2b4e5b2-1a00-0000-5c2f-68a2c2090000 pid=2498->guuid=437e24cd-1a00-0000-5c2f-68a2fb090000 pid=2555 clone guuid=6d4caccd-1a00-0000-5c2f-68a2ff090000 pid=2559 /usr/bin/rm delete-file guuid=d2b4e5b2-1a00-0000-5c2f-68a2c2090000 pid=2498->guuid=6d4caccd-1a00-0000-5c2f-68a2ff090000 pid=2559 execve guuid=ed6cf4cd-1a00-0000-5c2f-68a2010a0000 pid=2561 /usr/bin/dash guuid=d2b4e5b2-1a00-0000-5c2f-68a2c2090000 pid=2498->guuid=ed6cf4cd-1a00-0000-5c2f-68a2010a0000 pid=2561 clone guuid=f15615dc-1a00-0000-5c2f-68a22f0a0000 pid=2607 /usr/bin/chmod guuid=d2b4e5b2-1a00-0000-5c2f-68a2c2090000 pid=2498->guuid=f15615dc-1a00-0000-5c2f-68a22f0a0000 pid=2607 execve guuid=6cf057dc-1a00-0000-5c2f-68a2310a0000 pid=2609 /usr/bin/dash guuid=d2b4e5b2-1a00-0000-5c2f-68a2c2090000 pid=2498->guuid=6cf057dc-1a00-0000-5c2f-68a2310a0000 pid=2609 clone guuid=d3dee8dc-1a00-0000-5c2f-68a2350a0000 pid=2613 /usr/bin/rm delete-file guuid=d2b4e5b2-1a00-0000-5c2f-68a2c2090000 pid=2498->guuid=d3dee8dc-1a00-0000-5c2f-68a2350a0000 pid=2613 execve guuid=f3a72cdd-1a00-0000-5c2f-68a2370a0000 pid=2615 /usr/bin/dash guuid=d2b4e5b2-1a00-0000-5c2f-68a2c2090000 pid=2498->guuid=f3a72cdd-1a00-0000-5c2f-68a2370a0000 pid=2615 clone guuid=cd006dee-1a00-0000-5c2f-68a25f0a0000 pid=2655 /usr/bin/chmod guuid=d2b4e5b2-1a00-0000-5c2f-68a2c2090000 pid=2498->guuid=cd006dee-1a00-0000-5c2f-68a25f0a0000 pid=2655 execve guuid=e9e4c0ee-1a00-0000-5c2f-68a2610a0000 pid=2657 /usr/bin/dash guuid=d2b4e5b2-1a00-0000-5c2f-68a2c2090000 pid=2498->guuid=e9e4c0ee-1a00-0000-5c2f-68a2610a0000 pid=2657 clone guuid=50d62af1-1a00-0000-5c2f-68a2670a0000 pid=2663 /usr/bin/rm delete-file guuid=d2b4e5b2-1a00-0000-5c2f-68a2c2090000 pid=2498->guuid=50d62af1-1a00-0000-5c2f-68a2670a0000 pid=2663 execve guuid=0ee48df1-1a00-0000-5c2f-68a2690a0000 pid=2665 /usr/bin/dash guuid=d2b4e5b2-1a00-0000-5c2f-68a2c2090000 pid=2498->guuid=0ee48df1-1a00-0000-5c2f-68a2690a0000 pid=2665 clone guuid=1fde9302-1b00-0000-5c2f-68a2990a0000 pid=2713 /usr/bin/chmod guuid=d2b4e5b2-1a00-0000-5c2f-68a2c2090000 pid=2498->guuid=1fde9302-1b00-0000-5c2f-68a2990a0000 pid=2713 execve guuid=c079d702-1b00-0000-5c2f-68a29b0a0000 pid=2715 /usr/bin/dash guuid=d2b4e5b2-1a00-0000-5c2f-68a2c2090000 pid=2498->guuid=c079d702-1b00-0000-5c2f-68a29b0a0000 pid=2715 clone guuid=b55f5d03-1b00-0000-5c2f-68a29e0a0000 pid=2718 /usr/bin/rm delete-file guuid=d2b4e5b2-1a00-0000-5c2f-68a2c2090000 pid=2498->guuid=b55f5d03-1b00-0000-5c2f-68a29e0a0000 pid=2718 execve guuid=d9229903-1b00-0000-5c2f-68a2a00a0000 pid=2720 /usr/bin/dash guuid=d2b4e5b2-1a00-0000-5c2f-68a2c2090000 pid=2498->guuid=d9229903-1b00-0000-5c2f-68a2a00a0000 pid=2720 clone guuid=fe844615-1b00-0000-5c2f-68a2cb0a0000 pid=2763 /usr/bin/chmod guuid=d2b4e5b2-1a00-0000-5c2f-68a2c2090000 pid=2498->guuid=fe844615-1b00-0000-5c2f-68a2cb0a0000 pid=2763 execve guuid=3df3a115-1b00-0000-5c2f-68a2cc0a0000 pid=2764 /usr/bin/dash guuid=d2b4e5b2-1a00-0000-5c2f-68a2c2090000 pid=2498->guuid=3df3a115-1b00-0000-5c2f-68a2cc0a0000 pid=2764 clone guuid=ab764916-1b00-0000-5c2f-68a2cf0a0000 pid=2767 /usr/bin/rm delete-file guuid=d2b4e5b2-1a00-0000-5c2f-68a2c2090000 pid=2498->guuid=ab764916-1b00-0000-5c2f-68a2cf0a0000 pid=2767 execve guuid=85769716-1b00-0000-5c2f-68a2d00a0000 pid=2768 /usr/bin/grep guuid=d2b4e5b2-1a00-0000-5c2f-68a2c2090000 pid=2498->guuid=85769716-1b00-0000-5c2f-68a2d00a0000 pid=2768 execve guuid=26301317-1b00-0000-5c2f-68a2d20a0000 pid=2770 /usr/bin/sed guuid=d2b4e5b2-1a00-0000-5c2f-68a2c2090000 pid=2498->guuid=26301317-1b00-0000-5c2f-68a2d20a0000 pid=2770 execve guuid=dd0313ba-1a00-0000-5c2f-68a2d4090000 pid=2516 /usr/bin/wget dns net send-data write-file guuid=945608ba-1a00-0000-5c2f-68a2d2090000 pid=2514->guuid=dd0313ba-1a00-0000-5c2f-68a2d4090000 pid=2516 execve 4f6baed0-9587-596c-82b3-fd721afe4cc1 10.0.2.3:53 guuid=dd0313ba-1a00-0000-5c2f-68a2d4090000 pid=2516->4f6baed0-9587-596c-82b3-fd721afe4cc1 send: 80B 12a9440b-5bd0-5ef2-8870-9a05fdedf368 downloader.nvms9000.su:80 guuid=dd0313ba-1a00-0000-5c2f-68a2d4090000 pid=2516->12a9440b-5bd0-5ef2-8870-9a05fdedf368 send: 140B guuid=6aa7fccd-1a00-0000-5c2f-68a2020a0000 pid=2562 /usr/bin/wget dns net send-data write-file guuid=ed6cf4cd-1a00-0000-5c2f-68a2010a0000 pid=2561->guuid=6aa7fccd-1a00-0000-5c2f-68a2020a0000 pid=2562 execve guuid=6aa7fccd-1a00-0000-5c2f-68a2020a0000 pid=2562->4f6baed0-9587-596c-82b3-fd721afe4cc1 send: 80B guuid=6aa7fccd-1a00-0000-5c2f-68a2020a0000 pid=2562->12a9440b-5bd0-5ef2-8870-9a05fdedf368 send: 141B guuid=208638dd-1a00-0000-5c2f-68a2380a0000 pid=2616 /usr/bin/wget dns net send-data write-file guuid=f3a72cdd-1a00-0000-5c2f-68a2370a0000 pid=2615->guuid=208638dd-1a00-0000-5c2f-68a2380a0000 pid=2616 execve guuid=208638dd-1a00-0000-5c2f-68a2380a0000 pid=2616->4f6baed0-9587-596c-82b3-fd721afe4cc1 send: 80B guuid=208638dd-1a00-0000-5c2f-68a2380a0000 pid=2616->12a9440b-5bd0-5ef2-8870-9a05fdedf368 send: 141B guuid=16009ef1-1a00-0000-5c2f-68a26a0a0000 pid=2666 /usr/bin/wget dns net send-data write-file guuid=0ee48df1-1a00-0000-5c2f-68a2690a0000 pid=2665->guuid=16009ef1-1a00-0000-5c2f-68a26a0a0000 pid=2666 execve guuid=16009ef1-1a00-0000-5c2f-68a26a0a0000 pid=2666->4f6baed0-9587-596c-82b3-fd721afe4cc1 send: 80B guuid=16009ef1-1a00-0000-5c2f-68a26a0a0000 pid=2666->12a9440b-5bd0-5ef2-8870-9a05fdedf368 send: 141B guuid=f1f9a403-1b00-0000-5c2f-68a2a10a0000 pid=2721 /usr/bin/wget dns net send-data write-file guuid=d9229903-1b00-0000-5c2f-68a2a00a0000 pid=2720->guuid=f1f9a403-1b00-0000-5c2f-68a2a10a0000 pid=2721 execve guuid=f1f9a403-1b00-0000-5c2f-68a2a10a0000 pid=2721->4f6baed0-9587-596c-82b3-fd721afe4cc1 send: 80B guuid=f1f9a403-1b00-0000-5c2f-68a2a10a0000 pid=2721->12a9440b-5bd0-5ef2-8870-9a05fdedf368 send: 141B
Threat name:
Document-HTML.Downloader.Heuristic
Status:
Malicious
First seen:
2025-11-15 20:44:58 UTC
File Type:
Text (Shell)
AV detection:
10 of 24 (41.67%)
Threat level:
  2/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Modifies registry class
Suspicious use of SetWindowsHookEx
Enumerates physical storage devices
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:ach_202412_suspect_bash_script
Author:abuse.ch
Description:Detects suspicious Linux bash scripts
Rule name:Any_SU_Domain
Author:you
Description:Detect any reference to .su domains or subdomains

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh 774aa045f5a70f77419a50ff5835718a8e96ed290eafb215fc56b876315eca4c

(this sample)

  
Delivery method
Distributed via web download

Comments