MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 775160adbc64c36f489891183aef9c5d2775a3836f93861594379d0a998a0cb0. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 9


Intelligence 9 IOCs YARA File information Comments

SHA256 hash: 775160adbc64c36f489891183aef9c5d2775a3836f93861594379d0a998a0cb0
SHA3-384 hash: 1208ad08e389d486c54bdebc4ac598a707824d91766d313064308225b09510aa01fe88b1f2554f3946d60936eeb60833
SHA1 hash: 0d190d7097961f10c99769bd902632bd7fdb8ac0
MD5 hash: 47b06f7ea359b52261aacb648bc31f02
humanhash: november-fourteen-butter-nine
File name:fttt.sh
Download: download sample
Signature Mirai
File size:653 bytes
First seen:2025-12-17 17:06:58 UTC
Last seen:Never
File type: sh
MIME type:text/x-shellscript
ssdeep 6:h9OnFflE0Fu+yQU+KAjDyzHuyzfyuGjkeDyMwXBLFMLFdnB/pEa5YYIPadyivpps:d0FAAj2zzz6uGjSBKznMuvs
TLSH T115F0D6E52072007BE848AF41E174874DE132FAC462D42E75CCEE283B581FC0C71D4A39
TrID 70.0% (.SH) Linux/UNIX shell script (7000/1)
30.0% (.) Unix-like shebang (var.3) (gen) (3000/1)
Magika shell
Reporter abuse_ch
Tags:mirai sh
URLMalware sample (SHA256 hash)SignatureTags
http://kpq.at/f79f7b96b1cfa658a6e67bfc701ab897d52a8756cd827a413f7088a8d4c933406 Miraielf mirai ua-wget

Intelligence


File Origin
# of uploads :
1
# of downloads :
46
Origin country :
DE DE
Vendor Threat Intelligence
No detections
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
busybox evasive
Verdict:
Malicious
File Type:
unix shell
First seen:
2025-12-17T14:15:00Z UTC
Last seen:
2025-12-18T00:04:00Z UTC
Hits:
~10
Detections:
HEUR:Trojan-Downloader.Shell.Agent.p
Status:
terminated
Behavior Graph:
%3 guuid=7bdc43ff-1b00-0000-d8bb-00c3490d0000 pid=3401 /usr/bin/sudo guuid=b347fe00-1c00-0000-d8bb-00c3500d0000 pid=3408 /tmp/sample.bin guuid=7bdc43ff-1b00-0000-d8bb-00c3490d0000 pid=3401->guuid=b347fe00-1c00-0000-d8bb-00c3500d0000 pid=3408 execve guuid=79393b01-1c00-0000-d8bb-00c3520d0000 pid=3410 /usr/bin/wget dns net send-data write-file guuid=b347fe00-1c00-0000-d8bb-00c3500d0000 pid=3408->guuid=79393b01-1c00-0000-d8bb-00c3520d0000 pid=3410 execve guuid=2bae620c-1c00-0000-d8bb-00c3770d0000 pid=3447 /usr/bin/wget dns net send-data write-file guuid=b347fe00-1c00-0000-d8bb-00c3500d0000 pid=3408->guuid=2bae620c-1c00-0000-d8bb-00c3770d0000 pid=3447 execve guuid=e1ab2520-1c00-0000-d8bb-00c3aa0d0000 pid=3498 /usr/bin/wget dns net send-data write-file guuid=b347fe00-1c00-0000-d8bb-00c3500d0000 pid=3408->guuid=e1ab2520-1c00-0000-d8bb-00c3aa0d0000 pid=3498 execve guuid=99512f39-1c00-0000-d8bb-00c3b90d0000 pid=3513 /usr/bin/wget dns net send-data write-file guuid=b347fe00-1c00-0000-d8bb-00c3500d0000 pid=3408->guuid=99512f39-1c00-0000-d8bb-00c3b90d0000 pid=3513 execve guuid=323a6c45-1c00-0000-d8bb-00c3d20d0000 pid=3538 /usr/bin/chmod guuid=b347fe00-1c00-0000-d8bb-00c3500d0000 pid=3408->guuid=323a6c45-1c00-0000-d8bb-00c3d20d0000 pid=3538 execve guuid=7fb8cf45-1c00-0000-d8bb-00c3d30d0000 pid=3539 /usr/bin/dash guuid=b347fe00-1c00-0000-d8bb-00c3500d0000 pid=3408->guuid=7fb8cf45-1c00-0000-d8bb-00c3d30d0000 pid=3539 clone guuid=9c519a46-1c00-0000-d8bb-00c3d60d0000 pid=3542 /usr/bin/dash guuid=b347fe00-1c00-0000-d8bb-00c3500d0000 pid=3408->guuid=9c519a46-1c00-0000-d8bb-00c3d60d0000 pid=3542 clone guuid=91492a47-1c00-0000-d8bb-00c3da0d0000 pid=3546 /usr/bin/dash guuid=b347fe00-1c00-0000-d8bb-00c3500d0000 pid=3408->guuid=91492a47-1c00-0000-d8bb-00c3da0d0000 pid=3546 clone guuid=7e77bc47-1c00-0000-d8bb-00c3de0d0000 pid=3550 /usr/bin/dash guuid=b347fe00-1c00-0000-d8bb-00c3500d0000 pid=3408->guuid=7e77bc47-1c00-0000-d8bb-00c3de0d0000 pid=3550 clone guuid=3af55a48-1c00-0000-d8bb-00c3e20d0000 pid=3554 /usr/bin/rm delete-file guuid=b347fe00-1c00-0000-d8bb-00c3500d0000 pid=3408->guuid=3af55a48-1c00-0000-d8bb-00c3e20d0000 pid=3554 execve 4f6baed0-9587-596c-82b3-fd721afe4cc1 10.0.2.3:53 guuid=79393b01-1c00-0000-d8bb-00c3520d0000 pid=3410->4f6baed0-9587-596c-82b3-fd721afe4cc1 send: 48B 8de90fb0-2a98-5c62-9fc5-9fac58f25014 kpq.at:80 guuid=79393b01-1c00-0000-d8bb-00c3520d0000 pid=3410->8de90fb0-2a98-5c62-9fc5-9fac58f25014 send: 122B guuid=2bae620c-1c00-0000-d8bb-00c3770d0000 pid=3447->4f6baed0-9587-596c-82b3-fd721afe4cc1 send: 48B guuid=2bae620c-1c00-0000-d8bb-00c3770d0000 pid=3447->8de90fb0-2a98-5c62-9fc5-9fac58f25014 send: 122B guuid=e1ab2520-1c00-0000-d8bb-00c3aa0d0000 pid=3498->4f6baed0-9587-596c-82b3-fd721afe4cc1 send: 48B guuid=e1ab2520-1c00-0000-d8bb-00c3aa0d0000 pid=3498->8de90fb0-2a98-5c62-9fc5-9fac58f25014 send: 122B guuid=99512f39-1c00-0000-d8bb-00c3b90d0000 pid=3513->4f6baed0-9587-596c-82b3-fd721afe4cc1 send: 48B guuid=99512f39-1c00-0000-d8bb-00c3b90d0000 pid=3513->8de90fb0-2a98-5c62-9fc5-9fac58f25014 send: 122B
Threat name:
Win32.Trojan.Vigorf
Status:
Malicious
First seen:
2025-12-17 17:07:15 UTC
File Type:
Text (Shell)
AV detection:
7 of 24 (29.17%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:mirai botnet defense_evasion discovery linux
Behaviour
Reads runtime system information
System Network Configuration Discovery
Writes file to tmp directory
Changes its process name
Enumerates running processes
Writes file to system bin folder
File and Directory Permissions Modification
Executes dropped EXE
Modifies Watchdog functionality
Mirai
Mirai family
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh 775160adbc64c36f489891183aef9c5d2775a3836f93861594379d0a998a0cb0

(this sample)

  
Delivery method
Distributed via web download

Comments