MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 7a14b3271df3153b79aa0388631d3b2876fc7fbbd28b2dc63ddecaa22f239e4b. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 6


Intelligence 6 IOCs YARA 1 File information Comments

SHA256 hash: 7a14b3271df3153b79aa0388631d3b2876fc7fbbd28b2dc63ddecaa22f239e4b
SHA3-384 hash: c8dc6b6d1ac9c7eaf25513d3de47f07687d4c161fbd13a919cadeafd2a60924627fb1bfcb94fe8546440bfbe5b94b874
SHA1 hash: 9fdbcd1b442d6ce95c70cb4ac153ea117cb29f57
MD5 hash: fb4c460f76a5fc569134d05bcb3853c8
humanhash: edward-double-yankee-gee
File name:g
Download: download sample
Signature Mirai
File size:1'077 bytes
First seen:2025-08-23 02:02:17 UTC
Last seen:Never
File type: sh
MIME type:text/plain
ssdeep 24:E22IbO5zOt+MB0hR+kSspsmkSGhkSeZ1hkSjUkA:EAO5CEA0ikPkLkZZnklkA
TLSH T19B116DCF59659C72DCA85D8937520C24B88EC5E425CFCE8CA6CD8135D8DDE043593F69
Magika shell
Reporter abuse_ch
Tags:sh
URLMalware sample (SHA256 hash)SignatureTags
http://158.51.126.131/v/armv4le333d6098ba7af114b4e8b290f0e587592067b8e153798bf4763262d2074ad96 Miraielf mirai ua-wget
http://158.51.126.131/v/armv5l79d810e67c7bd6c6669214c1c4b631829d90726886b4167a232813d8434ef3f7 Miraielf mirai ua-wget
http://158.51.126.131/v/armv7lc3788d92bfc3a08dbcca4476832c46b099bcad182c56cdbccf837eb0edb6cd77 Miraielf mirai ua-wget
http://158.51.126.131/v/mipsd4e2e83716082a12346f565d13cc06546a099a05725f194c135f7b3839473a6c Miraielf mirai ua-wget
http://158.51.126.131/v/mipsel8db391280f5fda83a9dc476d69d093827bb72b3a90c3112679855eacabb996e1 Miraielf mirai ua-wget

Intelligence


File Origin
# of uploads :
1
# of downloads :
30
Origin country :
DE DE
Vendor Threat Intelligence
Verdict:
Malicious
File Type:
ps1
First seen:
2025-08-22T23:13:00Z UTC
Last seen:
2025-08-22T23:13:00Z UTC
Hits:
~10
Detections:
HEUR:Trojan-Downloader.Shell.Agent.p
Status:
terminated
Behavior Graph:
%3 guuid=94e7ba17-1900-0000-e879-87c732080000 pid=2098 /usr/bin/sudo guuid=cd06811a-1900-0000-e879-87c737080000 pid=2103 /tmp/sample.bin guuid=94e7ba17-1900-0000-e879-87c732080000 pid=2098->guuid=cd06811a-1900-0000-e879-87c737080000 pid=2103 execve guuid=37e6d71a-1900-0000-e879-87c739080000 pid=2105 /usr/bin/dash guuid=cd06811a-1900-0000-e879-87c737080000 pid=2103->guuid=37e6d71a-1900-0000-e879-87c739080000 pid=2105 clone guuid=d4c99d1b-1900-0000-e879-87c741080000 pid=2113 /usr/bin/rm delete-file guuid=cd06811a-1900-0000-e879-87c737080000 pid=2103->guuid=d4c99d1b-1900-0000-e879-87c741080000 pid=2113 execve guuid=b441da1b-1900-0000-e879-87c743080000 pid=2115 /usr/bin/rm delete-file guuid=cd06811a-1900-0000-e879-87c737080000 pid=2103->guuid=b441da1b-1900-0000-e879-87c743080000 pid=2115 execve guuid=7bb51b1c-1900-0000-e879-87c745080000 pid=2117 /usr/bin/rm delete-file guuid=cd06811a-1900-0000-e879-87c737080000 pid=2103->guuid=7bb51b1c-1900-0000-e879-87c745080000 pid=2117 execve guuid=783b5a1c-1900-0000-e879-87c747080000 pid=2119 /usr/bin/dash guuid=cd06811a-1900-0000-e879-87c737080000 pid=2103->guuid=783b5a1c-1900-0000-e879-87c747080000 pid=2119 clone guuid=6125f41c-1900-0000-e879-87c74a080000 pid=2122 /usr/bin/dash guuid=cd06811a-1900-0000-e879-87c737080000 pid=2103->guuid=6125f41c-1900-0000-e879-87c74a080000 pid=2122 clone guuid=b8da671d-1900-0000-e879-87c74c080000 pid=2124 /usr/bin/dash guuid=cd06811a-1900-0000-e879-87c737080000 pid=2103->guuid=b8da671d-1900-0000-e879-87c74c080000 pid=2124 clone guuid=f49e4a41-1900-0000-e879-87c7ac080000 pid=2220 /usr/bin/chmod guuid=cd06811a-1900-0000-e879-87c737080000 pid=2103->guuid=f49e4a41-1900-0000-e879-87c7ac080000 pid=2220 execve guuid=79389c41-1900-0000-e879-87c7ae080000 pid=2222 /usr/bin/dash guuid=cd06811a-1900-0000-e879-87c737080000 pid=2103->guuid=79389c41-1900-0000-e879-87c7ae080000 pid=2222 clone guuid=bc4e4e42-1900-0000-e879-87c7b2080000 pid=2226 /usr/bin/dash guuid=cd06811a-1900-0000-e879-87c737080000 pid=2103->guuid=bc4e4e42-1900-0000-e879-87c7b2080000 pid=2226 clone guuid=f430e66d-1900-0000-e879-87c708090000 pid=2312 /usr/bin/chmod guuid=cd06811a-1900-0000-e879-87c737080000 pid=2103->guuid=f430e66d-1900-0000-e879-87c708090000 pid=2312 execve guuid=f8724e6e-1900-0000-e879-87c709090000 pid=2313 /usr/bin/dash guuid=cd06811a-1900-0000-e879-87c737080000 pid=2103->guuid=f8724e6e-1900-0000-e879-87c709090000 pid=2313 clone guuid=9e3f5e6f-1900-0000-e879-87c70b090000 pid=2315 /usr/bin/dash guuid=cd06811a-1900-0000-e879-87c737080000 pid=2103->guuid=9e3f5e6f-1900-0000-e879-87c70b090000 pid=2315 clone guuid=f77f829a-1900-0000-e879-87c76f090000 pid=2415 /usr/bin/chmod guuid=cd06811a-1900-0000-e879-87c737080000 pid=2103->guuid=f77f829a-1900-0000-e879-87c76f090000 pid=2415 execve guuid=3a5ccd9a-1900-0000-e879-87c771090000 pid=2417 /usr/bin/dash guuid=cd06811a-1900-0000-e879-87c737080000 pid=2103->guuid=3a5ccd9a-1900-0000-e879-87c771090000 pid=2417 clone guuid=4662779b-1900-0000-e879-87c774090000 pid=2420 /usr/bin/dash guuid=cd06811a-1900-0000-e879-87c737080000 pid=2103->guuid=4662779b-1900-0000-e879-87c774090000 pid=2420 clone guuid=908b0bc7-1900-0000-e879-87c7cd090000 pid=2509 /usr/bin/chmod guuid=cd06811a-1900-0000-e879-87c737080000 pid=2103->guuid=908b0bc7-1900-0000-e879-87c7cd090000 pid=2509 execve guuid=fdc756c7-1900-0000-e879-87c7ce090000 pid=2510 /usr/bin/dash guuid=cd06811a-1900-0000-e879-87c737080000 pid=2103->guuid=fdc756c7-1900-0000-e879-87c7ce090000 pid=2510 clone guuid=510780c8-1900-0000-e879-87c7d4090000 pid=2516 /usr/bin/dash guuid=cd06811a-1900-0000-e879-87c737080000 pid=2103->guuid=510780c8-1900-0000-e879-87c7d4090000 pid=2516 clone guuid=3a236ffb-1900-0000-e879-87c74d0a0000 pid=2637 /usr/bin/chmod guuid=cd06811a-1900-0000-e879-87c737080000 pid=2103->guuid=3a236ffb-1900-0000-e879-87c74d0a0000 pid=2637 execve guuid=3d75c5fb-1900-0000-e879-87c74f0a0000 pid=2639 /usr/bin/dash guuid=cd06811a-1900-0000-e879-87c737080000 pid=2103->guuid=3d75c5fb-1900-0000-e879-87c74f0a0000 pid=2639 clone guuid=bf0ee01a-1900-0000-e879-87c73a080000 pid=2106 /usr/bin/cat guuid=37e6d71a-1900-0000-e879-87c739080000 pid=2105->guuid=bf0ee01a-1900-0000-e879-87c73a080000 pid=2106 execve guuid=5b0ae61a-1900-0000-e879-87c73b080000 pid=2107 /usr/bin/grep guuid=37e6d71a-1900-0000-e879-87c739080000 pid=2105->guuid=5b0ae61a-1900-0000-e879-87c73b080000 pid=2107 execve guuid=6756eb1a-1900-0000-e879-87c73c080000 pid=2108 /usr/bin/grep guuid=37e6d71a-1900-0000-e879-87c739080000 pid=2105->guuid=6756eb1a-1900-0000-e879-87c73c080000 pid=2108 execve guuid=1bc2ef1a-1900-0000-e879-87c73d080000 pid=2109 /usr/bin/grep guuid=37e6d71a-1900-0000-e879-87c739080000 pid=2105->guuid=1bc2ef1a-1900-0000-e879-87c73d080000 pid=2109 execve guuid=b26df41a-1900-0000-e879-87c73e080000 pid=2110 /usr/bin/cut guuid=37e6d71a-1900-0000-e879-87c739080000 pid=2105->guuid=b26df41a-1900-0000-e879-87c73e080000 pid=2110 execve guuid=e973611c-1900-0000-e879-87c748080000 pid=2120 /usr/bin/cp write-file guuid=783b5a1c-1900-0000-e879-87c747080000 pid=2119->guuid=e973611c-1900-0000-e879-87c748080000 pid=2120 execve guuid=6f48fd1c-1900-0000-e879-87c74b080000 pid=2123 /usr/bin/chmod guuid=6125f41c-1900-0000-e879-87c74a080000 pid=2122->guuid=6f48fd1c-1900-0000-e879-87c74b080000 pid=2123 execve guuid=a27a7a1d-1900-0000-e879-87c74d080000 pid=2125 /usr/bin/wget net send-data write-file guuid=b8da671d-1900-0000-e879-87c74c080000 pid=2124->guuid=a27a7a1d-1900-0000-e879-87c74d080000 pid=2125 execve 2beca644-24da-5e18-bc49-c06b8c4a111d 158.51.126.131:80 guuid=a27a7a1d-1900-0000-e879-87c74d080000 pid=2125->2beca644-24da-5e18-bc49-c06b8c4a111d send: 137B guuid=46205642-1900-0000-e879-87c7b3080000 pid=2227 /usr/bin/wget net send-data write-file guuid=bc4e4e42-1900-0000-e879-87c7b2080000 pid=2226->guuid=46205642-1900-0000-e879-87c7b3080000 pid=2227 execve guuid=46205642-1900-0000-e879-87c7b3080000 pid=2227->2beca644-24da-5e18-bc49-c06b8c4a111d send: 137B guuid=54c7696f-1900-0000-e879-87c70d090000 pid=2317 /usr/bin/wget net send-data write-file guuid=9e3f5e6f-1900-0000-e879-87c70b090000 pid=2315->guuid=54c7696f-1900-0000-e879-87c70d090000 pid=2317 execve guuid=54c7696f-1900-0000-e879-87c70d090000 pid=2317->2beca644-24da-5e18-bc49-c06b8c4a111d send: 137B guuid=d4bb7c9b-1900-0000-e879-87c775090000 pid=2421 /usr/bin/wget net send-data write-file guuid=4662779b-1900-0000-e879-87c774090000 pid=2420->guuid=d4bb7c9b-1900-0000-e879-87c775090000 pid=2421 execve guuid=d4bb7c9b-1900-0000-e879-87c775090000 pid=2421->2beca644-24da-5e18-bc49-c06b8c4a111d send: 135B guuid=c4c78ac8-1900-0000-e879-87c7d5090000 pid=2517 /usr/bin/wget net send-data write-file guuid=510780c8-1900-0000-e879-87c7d4090000 pid=2516->guuid=c4c78ac8-1900-0000-e879-87c7d5090000 pid=2517 execve guuid=c4c78ac8-1900-0000-e879-87c7d5090000 pid=2517->2beca644-24da-5e18-bc49-c06b8c4a111d send: 137B
Verdict:
Malicious
Threat:
Trojan-Downloader.Shell.Agent
Threat name:
Linux.Downloader.SAgnt
Status:
Malicious
First seen:
2025-08-23 02:04:35 UTC
File Type:
Text (Shell)
AV detection:
9 of 24 (37.50%)
Threat level:
  3/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Modifies registry class
Suspicious use of SetWindowsHookEx
Enumerates physical storage devices
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:ach_202412_suspect_bash_script
Author:abuse.ch
Description:Detects suspicious Linux bash scripts

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh 7a14b3271df3153b79aa0388631d3b2876fc7fbbd28b2dc63ddecaa22f239e4b

(this sample)

  
Delivery method
Distributed via web download

Comments