MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 7ad677c619791daa0d0c69ffffb20e1dafaa3facaf9071f69ce38745ed5b3657. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 8


Intelligence 8 IOCs YARA 1 File information Comments

SHA256 hash: 7ad677c619791daa0d0c69ffffb20e1dafaa3facaf9071f69ce38745ed5b3657
SHA3-384 hash: 3a3cd0bfaff85ab9f9adab0d87385b6d62a37b06e591e73fff593c8ff8e4669536e16d84252d6f11dbdd8729f85bb3d5
SHA1 hash: 70c06795d53a7d2fec854a44b02a29b5cb8335e4
MD5 hash: 2a302119fdddfc666f04b3dd4e43c08f
humanhash: skylark-sixteen-cup-jig
File name:1.sh
Download: download sample
Signature Mirai
File size:5'069 bytes
First seen:2025-10-12 17:20:47 UTC
Last seen:2025-10-16 01:13:03 UTC
File type: sh
MIME type:text/x-shellscript
ssdeep 96:ik23mB/kJOBqukop83xk8A8h18vKknk7sUkTgnAokuPOZHkuPOZHkbofIuLkMNSE:J23mBcJOBqFop83edC12Rnk7sLTgnA/O
TLSH T1E9A14FD224C663ACDE9A8D2FA5546EB920CBF55BAB4B4DA885DF307E348AE041404DD3
Magika shell
Reporter abuse_ch
Tags:mirai sh
URLMalware sample (SHA256 hash)SignatureTags
http://196.251.72.149/bins/nwfaiehg4ewijfgriehgirehaughrarg.x8643edbdb16def45539b81cf4053f87516c4032549a7c341463f0475909d351baf Miraielf geofenced mirai opendir ua-wget USA x86
http://196.251.72.149/bins/nwfaiehg4ewijfgriehgirehaughrarg.mipsn/an/aelf geofenced mips mirai opendir ua-wget USA
http://196.251.72.149/bins/nwfaiehg4ewijfgriehgirehaughrarg.arcae9a3e7dc4002050dc3c0c8798a66b7210913674a7c6965677d775ac1d6a51d8 Miraiarc elf geofenced mirai opendir ua-wget USA
http://196.251.72.149/bins/nwfaiehg4ewijfgriehgirehaughrarg.i468n/an/aelf ua-wget
http://196.251.72.149/bins/nwfaiehg4ewijfgriehgirehaughrarg.i68608093b754e88bafb352c0b38dcd97104d7f34a6f3dbaf37b85f31886371d404e Miraielf geofenced mirai opendir ua-wget USA x86
http://196.251.72.149/bins/nwfaiehg4ewijfgriehgirehaughrarg.x86_648a08c19116a537e1212a91a47489256c32f0a72ddafed987eac142c7eeb2f998 Miraielf geofenced mirai opendir ua-wget USA x86
http://196.251.72.149/bins/nwfaiehg4ewijfgriehgirehaughrarg.mpsl4a532a6908798015ed84f3658d12fe95810f07e528000514860a2100fd09005c Miraielf geofenced mips mirai opendir ua-wget USA
http://196.251.72.149/bins/nwfaiehg4ewijfgriehgirehaughrarg.arm590f87b0cae5f2d9bd58e76b66d9df5b6a230f58edf56545f04241852fff7bfe Miraiarm elf geofenced mirai opendir ua-wget USA
http://196.251.72.149/bins/nwfaiehg4ewijfgriehgirehaughrarg.arm5c8c19604d326a326b1d4c922fa11ea1bdc093699cb34c44a45d9c024a0c3aa81 Miraiarm elf geofenced mirai opendir ua-wget USA
http://196.251.72.149/bins/nwfaiehg4ewijfgriehgirehaughrarg.arm656837963ab6758ee1ffd6735189005083e9de2e56aa8f96a1998473f675a2503 Miraiarm elf geofenced mirai opendir ua-wget USA
http://196.251.72.149/bins/nwfaiehg4ewijfgriehgirehaughrarg.arm76a938cb6981ca2bfacc256d6b73ca21eea2963bc2bb62ed133698804b0a0b74d Miraielf mirai ua-wget
http://196.251.72.149/bins/nwfaiehg4ewijfgriehgirehaughrarg.ppc14f5afae6cfabb2ccdddcf3a03057d3c3539da9621a2d6a3b1e879dc19479e17 Miraielf geofenced mirai opendir PowerPC ua-wget USA
http://196.251.72.149/bins/nwfaiehg4ewijfgriehgirehaughrarg.spc9f8cb3f15f59a5c38c70e03046fadb89449fc13de329b813b92b754110832c4d Miraielf geofenced mirai opendir sparc ua-wget USA
http://196.251.72.149/bins/nwfaiehg4ewijfgriehgirehaughrarg.m68kn/an/aelf geofenced m68k mirai opendir ua-wget USA
http://196.251.72.149/bins/nwfaiehg4ewijfgriehgirehaughrarg.sh4f41db3a1c7e946fb4fce01fa0db2e756be125a621ff1ce31a289d635230cbc7f Miraielf geofenced mirai opendir SuperH ua-wget USA

Intelligence


File Origin
# of uploads :
2
# of downloads :
51
Origin country :
DE DE
Vendor Threat Intelligence
Verdict:
Malicious
File Type:
unix shell
First seen:
2025-10-12T14:28:00Z UTC
Last seen:
2025-10-14T13:53:00Z UTC
Hits:
~1000
Threat name:
Script-Shell.Downloader.Heuristic
Status:
Malicious
First seen:
2025-10-12 17:21:38 UTC
File Type:
Text (Shell)
AV detection:
20 of 38 (52.63%)
Threat level:
  2/5
Result
Malware family:
Score:
  10/10
Tags:
family:mirai antivm botnet defense_evasion discovery linux upx
Behaviour
Reads runtime system information
System Network Configuration Discovery
Writes file to tmp directory
Changes its process name
Checks CPU configuration
UPX packed file
Deletes log files
Enumerates running processes
File and Directory Permissions Modification
Deletes Audit logs
Deletes journal logs
Deletes system logs
Executes dropped EXE
Mirai
Mirai family
Malware Config
C2 Extraction:
seal.bravoteam6.org
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Linux_Shellscript_Downloader
Author:albertzsigovits
Description:Generic Approach to Shellscript downloaders

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh 7ad677c619791daa0d0c69ffffb20e1dafaa3facaf9071f69ce38745ed5b3657

(this sample)

  
Delivery method
Distributed via web download

Comments