MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 798faa39befee1f373f065e4b133dc1a5aa65e46a0c1a378c1f4ce7d5e4bcf23. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: 798faa39befee1f373f065e4b133dc1a5aa65e46a0c1a378c1f4ce7d5e4bcf23
SHA3-384 hash: 88628f5b3af59d253f520d48661da2015858c01c8c9b9e0ec29cd3dc42f9a6f5a09bbb2e0a5bcf3d76fe92144b33dc4b
SHA1 hash: 454c41b2c74ac886c7d2928b50838442d67c2e33
MD5 hash: 289ee9e0b461a7084124963fa814d591
humanhash: earth-fish-hot-magazine
File name:tplink.sh
Download: download sample
Signature Mirai
File size:1'253 bytes
First seen:2025-09-06 19:49:05 UTC
Last seen:Never
File type: sh
MIME type:text/x-shellscript
ssdeep 24:boWBGhBh9Mk8QoOwXQip/cgzJe6i43c3qKsGCGAKpatkk0:boGGhL8QoUcigcTAIat/0
TLSH T1BB2168DEB591A2715C6C8D40B9D2C825B01F62C720A05E69F84B2E67BCD8E02F458F3A
Magika shell
Reporter abuse_ch
Tags:mirai sh
URLMalware sample (SHA256 hash)SignatureTags
http://160.250.134.48/mipsfd75057993af111cf29aeb0924554d01ad28c071fb20cf9700831fd4402fbaf2 Miraielf gafgyt geofenced mips mirai ua-wget USA
http://160.250.134.48/mpslfc2117cb6a4433fc0a3711ce912f4a1794741dfe467cf7c64ac9250e125b927c Miraielf geofenced mips mirai ua-wget USA
http://160.250.134.48/arme16a5e543be159372994cf2bd528b703cfc4ebe667e153a34de20e13de0bc265 Miraiarm elf geofenced mirai ua-wget USA
http://160.250.134.48/arm5ef0759560923799625dbffbc95e23935d0c09da4aad0e7e285a24510c1255a97 Miraiarm elf geofenced mirai ua-wget USA
http://160.250.134.48/arm76509f8d5312e74b83dcc973477b33d6a439bc050545d2bc54962f9b43d8ddf88 Miraiarm elf geofenced mirai ua-wget USA
http://160.250.134.48/x86n/an/aelf ua-wget

Intelligence


File Origin
# of uploads :
1
# of downloads :
36
Origin country :
DE DE
Vendor Threat Intelligence
Verdict:
Malicious
File Type:
unix shell
First seen:
2025-09-06T17:38:00Z UTC
Last seen:
2025-09-06T17:38:00Z UTC
Hits:
~10
Detections:
HEUR:Trojan-Downloader.Shell.Agent.a
Status:
terminated
Behavior Graph:
%3 guuid=b50e09d2-1a00-0000-4c45-5d921e0c0000 pid=3102 /usr/bin/sudo guuid=a64f89d4-1a00-0000-4c45-5d92270c0000 pid=3111 /tmp/sample.bin guuid=b50e09d2-1a00-0000-4c45-5d921e0c0000 pid=3102->guuid=a64f89d4-1a00-0000-4c45-5d92270c0000 pid=3111 execve guuid=561680db-1a00-0000-4c45-5d923c0c0000 pid=3132 /usr/bin/rm guuid=a64f89d4-1a00-0000-4c45-5d92270c0000 pid=3111->guuid=561680db-1a00-0000-4c45-5d923c0c0000 pid=3132 execve guuid=6dd3e1db-1a00-0000-4c45-5d923d0c0000 pid=3133 /usr/bin/wget net send-data write-file guuid=a64f89d4-1a00-0000-4c45-5d92270c0000 pid=3111->guuid=6dd3e1db-1a00-0000-4c45-5d923d0c0000 pid=3133 execve guuid=32ea5b27-1b00-0000-4c45-5d928d0c0000 pid=3213 /usr/bin/chmod guuid=a64f89d4-1a00-0000-4c45-5d92270c0000 pid=3111->guuid=32ea5b27-1b00-0000-4c45-5d928d0c0000 pid=3213 execve guuid=75fbd927-1b00-0000-4c45-5d928e0c0000 pid=3214 /usr/bin/dash guuid=a64f89d4-1a00-0000-4c45-5d92270c0000 pid=3111->guuid=75fbd927-1b00-0000-4c45-5d928e0c0000 pid=3214 clone guuid=83085e2a-1b00-0000-4c45-5d92910c0000 pid=3217 /usr/bin/wget net send-data write-file guuid=a64f89d4-1a00-0000-4c45-5d92270c0000 pid=3111->guuid=83085e2a-1b00-0000-4c45-5d92910c0000 pid=3217 execve guuid=4010aa7b-1b00-0000-4c45-5d92190d0000 pid=3353 /usr/bin/chmod guuid=a64f89d4-1a00-0000-4c45-5d92270c0000 pid=3111->guuid=4010aa7b-1b00-0000-4c45-5d92190d0000 pid=3353 execve guuid=88f4057c-1b00-0000-4c45-5d921b0d0000 pid=3355 /usr/bin/dash guuid=a64f89d4-1a00-0000-4c45-5d92270c0000 pid=3111->guuid=88f4057c-1b00-0000-4c45-5d921b0d0000 pid=3355 clone guuid=5748e77c-1b00-0000-4c45-5d921e0d0000 pid=3358 /usr/bin/wget net send-data write-file guuid=a64f89d4-1a00-0000-4c45-5d92270c0000 pid=3111->guuid=5748e77c-1b00-0000-4c45-5d921e0d0000 pid=3358 execve guuid=d81418c3-1b00-0000-4c45-5d92b70d0000 pid=3511 /usr/bin/chmod guuid=a64f89d4-1a00-0000-4c45-5d92270c0000 pid=3111->guuid=d81418c3-1b00-0000-4c45-5d92b70d0000 pid=3511 execve guuid=60297bc3-1b00-0000-4c45-5d92b90d0000 pid=3513 /usr/bin/dash guuid=a64f89d4-1a00-0000-4c45-5d92270c0000 pid=3111->guuid=60297bc3-1b00-0000-4c45-5d92b90d0000 pid=3513 clone guuid=534304c5-1b00-0000-4c45-5d92bf0d0000 pid=3519 /usr/bin/wget net send-data write-file guuid=a64f89d4-1a00-0000-4c45-5d92270c0000 pid=3111->guuid=534304c5-1b00-0000-4c45-5d92bf0d0000 pid=3519 execve guuid=465bda0a-1c00-0000-4c45-5d924b0e0000 pid=3659 /usr/bin/chmod guuid=a64f89d4-1a00-0000-4c45-5d92270c0000 pid=3111->guuid=465bda0a-1c00-0000-4c45-5d924b0e0000 pid=3659 execve guuid=ac2b1a0b-1c00-0000-4c45-5d924d0e0000 pid=3661 /usr/bin/dash guuid=a64f89d4-1a00-0000-4c45-5d92270c0000 pid=3111->guuid=ac2b1a0b-1c00-0000-4c45-5d924d0e0000 pid=3661 clone guuid=7335cf0b-1c00-0000-4c45-5d92520e0000 pid=3666 /usr/bin/wget net send-data write-file guuid=a64f89d4-1a00-0000-4c45-5d92270c0000 pid=3111->guuid=7335cf0b-1c00-0000-4c45-5d92520e0000 pid=3666 execve guuid=ecbcda54-1c00-0000-4c45-5d925c0f0000 pid=3932 /usr/bin/chmod guuid=a64f89d4-1a00-0000-4c45-5d92270c0000 pid=3111->guuid=ecbcda54-1c00-0000-4c45-5d925c0f0000 pid=3932 execve guuid=5edd1455-1c00-0000-4c45-5d92600f0000 pid=3936 /usr/bin/dash guuid=a64f89d4-1a00-0000-4c45-5d92270c0000 pid=3111->guuid=5edd1455-1c00-0000-4c45-5d92600f0000 pid=3936 clone guuid=e4e0ab56-1c00-0000-4c45-5d92680f0000 pid=3944 /usr/bin/wget net send-data guuid=a64f89d4-1a00-0000-4c45-5d92270c0000 pid=3111->guuid=e4e0ab56-1c00-0000-4c45-5d92680f0000 pid=3944 execve guuid=03fc7a73-1c00-0000-4c45-5d92cd0f0000 pid=4045 /usr/bin/busybox net send-data guuid=a64f89d4-1a00-0000-4c45-5d92270c0000 pid=3111->guuid=03fc7a73-1c00-0000-4c45-5d92cd0f0000 pid=4045 execve guuid=e562f48f-1c00-0000-4c45-5d9235100000 pid=4149 /usr/bin/chmod guuid=a64f89d4-1a00-0000-4c45-5d92270c0000 pid=3111->guuid=e562f48f-1c00-0000-4c45-5d9235100000 pid=4149 execve guuid=f2e12b90-1c00-0000-4c45-5d9236100000 pid=4150 /usr/bin/dash guuid=a64f89d4-1a00-0000-4c45-5d92270c0000 pid=3111->guuid=f2e12b90-1c00-0000-4c45-5d9236100000 pid=4150 clone 2398d6d7-9b73-5561-a5f7-2e279e659454 160.250.134.48:80 guuid=6dd3e1db-1a00-0000-4c45-5d923d0c0000 pid=3133->2398d6d7-9b73-5561-a5f7-2e279e659454 send: 133B guuid=83085e2a-1b00-0000-4c45-5d92910c0000 pid=3217->2398d6d7-9b73-5561-a5f7-2e279e659454 send: 133B guuid=5748e77c-1b00-0000-4c45-5d921e0d0000 pid=3358->2398d6d7-9b73-5561-a5f7-2e279e659454 send: 132B guuid=534304c5-1b00-0000-4c45-5d92bf0d0000 pid=3519->2398d6d7-9b73-5561-a5f7-2e279e659454 send: 133B guuid=7335cf0b-1c00-0000-4c45-5d92520e0000 pid=3666->2398d6d7-9b73-5561-a5f7-2e279e659454 send: 133B guuid=e4e0ab56-1c00-0000-4c45-5d92680f0000 pid=3944->2398d6d7-9b73-5561-a5f7-2e279e659454 send: 132B guuid=03fc7a73-1c00-0000-4c45-5d92cd0f0000 pid=4045->2398d6d7-9b73-5561-a5f7-2e279e659454 send: 80B
Threat name:
Linux.Downloader.SAgnt
Status:
Malicious
First seen:
2025-09-06 19:52:29 UTC
File Type:
Text (Shell)
AV detection:
18 of 38 (47.37%)
Threat level:
  3/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
credential_access defense_evasion discovery linux
Behaviour
Reads runtime system information
System Network Configuration Discovery
Writes file to tmp directory
Changes its process name
Reads system network configuration
Reads process memory
Enumerates running processes
Reads MAC address of network interface
Reads system routing table
File and Directory Permissions Modification
Executes dropped EXE
Renames itself
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh 798faa39befee1f373f065e4b133dc1a5aa65e46a0c1a378c1f4ce7d5e4bcf23

(this sample)

  
Delivery method
Distributed via web download

Comments