MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 7754b081f9bd1245403f7f2f55da6011799107ca4828a41f51d394c66fe3ff6f. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 9


Intelligence 9 IOCs YARA 1 File information Comments

SHA256 hash: 7754b081f9bd1245403f7f2f55da6011799107ca4828a41f51d394c66fe3ff6f
SHA3-384 hash: 2e8f96a154a5ce76cae4a2871f0481d3870c71f001f9e301ba37b4bd01420ea33fa989266282b91328a432d31b55dfdc
SHA1 hash: 1977d5bdf31c10f7d4f7ef7fca740f9d4404507c
MD5 hash: 58efa084772c2fb11d6e6dfab2b52fe5
humanhash: alabama-speaker-zebra-social
File name:fentbins.sh
Download: download sample
Signature Mirai
File size:1'790 bytes
First seen:2025-12-07 06:08:00 UTC
Last seen:2025-12-08 05:20:08 UTC
File type: sh
MIME type:text/x-shellscript
ssdeep 24:v/M2/tjt2Cz/7KMj/l/6QT/7v/9KM0E/lJ/pYG/Wq/bBOz:v9fT7d9TLV/jRg
TLSH T16E3172C8216244B73C959927B3FA8EA8F9E15D6168C85E585DDC38F485CCF4CB872BC2
TrID 70.0% (.SH) Linux/UNIX shell script (7000/1)
30.0% (.) Unix-like shebang (var.3) (gen) (3000/1)
Magika shell
Reporter abuse_ch
Tags:mirai sh
URLMalware sample (SHA256 hash)SignatureTags
http://103.130.215.101/fent.x86a6af14d85e602b793af279c026ff8fe21da1882c11a015f6f23a731c9725d95b Miraimirai opendir
http://103.130.215.101/fent.mipsefcfcee111b69c7c3730d7b429449736beb267277a83635be1a48a8aec6326b9 Miraimirai opendir
http://103.130.215.101/fent.mpsl9b1c0a304cbef724c4d10f70a51616574270a11498c8ef62db288a6f90f5da5a Miraimirai opendir
http://103.130.215.101/fent.arm4n/an/aelf ua-wget
http://103.130.215.101/fent.arm5ecbf6819b9914bcda43f75be697722548a0b8a98640229df64544721c2d89457 Miraimirai opendir
http://103.130.215.101/fent.arm6fbad5a3c1bec021939fd5c477456bd337da11ccac30d75f58f2b3024b326acb2 Miraimirai opendir
http://103.130.215.101/fent.arm79f1b8f653ba154b76e9f8adf432714d01b0f44fd014b49fcd8e7dcaca5b7640e Miraimirai opendir
http://103.130.215.101/fent.ppcb72b8a3384292dda4c3fe8766ecbd795e9e93b44a55f3dfdc50cf17e1452d235 Miraimirai opendir
http://103.130.215.101/fent.m68k1e6a8da78e09cc2ea9f5a57ba3589a9301feeddaf90d2c50d4756aa28322f42e Miraimirai opendir
http://103.130.215.101/fent.sh40034bbc1e465614894f4284f6bb920b3231efc16856e26b6a8316e99a682526a Miraimirai opendir

Intelligence


File Origin
# of uploads :
3
# of downloads :
49
Origin country :
DE DE
Vendor Threat Intelligence
No detections
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
medusa mirai
Result
Gathering data
Threat name:
Linux.Downloader.Morila
Status:
Malicious
First seen:
2025-12-07 06:08:17 UTC
File Type:
Text (Shell)
AV detection:
22 of 36 (61.11%)
Threat level:
  3/5
Result
Malware family:
Score:
  10/10
Tags:
family:mirai botnet defense_evasion discovery linux
Behaviour
Reads runtime system information
System Network Configuration Discovery
Writes file to tmp directory
Changes its process name
File and Directory Permissions Modification
Executes dropped EXE
Modifies Watchdog functionality
Mirai
Mirai family
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Linux_Shellscript_Downloader
Author:albertzsigovits
Description:Generic Approach to Shellscript downloaders

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh 7754b081f9bd1245403f7f2f55da6011799107ca4828a41f51d394c66fe3ff6f

(this sample)

  
Delivery method
Distributed via web download

Comments