MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 7c54df1f3e34ae697a519f2654f25ae7727afc19c3f6d4bd7ad36918496ecf27. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: 7c54df1f3e34ae697a519f2654f25ae7727afc19c3f6d4bd7ad36918496ecf27
SHA3-384 hash: 8ea42cff67d760b3a9513c3c2f194ecc94e4e2fde075dee346a02b2817464ee131d6a5e6ee025ee54bd8c528e27fef67
SHA1 hash: 11907bac109a1226e37bf0d78d93616a5fa3e060
MD5 hash: f76074c598922e65c44ef75c7b5a65b5
humanhash: charlie-michigan-pluto-blossom
File name:curl.sh
Download: download sample
Signature Mirai
File size:705 bytes
First seen:2025-12-16 07:53:47 UTC
Last seen:2025-12-16 22:53:10 UTC
File type: sh
MIME type:text/x-shellscript
ssdeep 12:KhI5W3CtI1/TbNM8BpFzBwBtM8B81npLOhcM8BO26M8BeliAE/M8BXqlHWM8BFot:KOQyS1bbekBTR1npLO9Zw1liAjIqlV2G
TLSH T11C01D89842806757D34C8F2FB79350BF2721E6CD641A2BC0F38766B897847C5B028A63
TrID 70.0% (.SH) Linux/UNIX shell script (7000/1)
30.0% (.) Unix-like shebang (var.3) (gen) (3000/1)
Magika shell
Reporter abuse_ch
Tags:sh
URLMalware sample (SHA256 hash)SignatureTags
http://103.146.23.241/armd644216430162eedfd4802db751eff4f17377670b5c47228004dadd71897597c Mirai32-bit elf mirai Mozi
http://103.146.23.241/arm5f04c4dc69e11b6ff322d29b1eee7be04ebac63072d55b95f17c3fc1766c4506d Miraielf mirai ua-wget
http://103.146.23.241/arm77586ac1a9c77b7e4a9222f683d1f0aec4c98c52749942a9ec1f9d03d19d1a17e Miraielf mirai ua-wget
http://103.146.23.241/mips599ae6cad63435034cd4c298424a0e41916c99f059961e038da7012c83059ecb Mirai32-bit elf gafgyt mirai Mozi
http://103.146.23.241/mpslb2495ee300355d0d9e93340929e9a7de0bcffbf95e6aff5b98f09b3f9fe1c7b6 Miraielf gafgyt mirai ua-wget
http://103.146.23.241/arc376195291aabab3e3bb96a19bd4ada7197cc503f1a2cc43e6ff3a7c45a9e9f83 Miraielf gafgyt mirai ua-wget
http://103.146.23.241/aarch648e2d51bcd5fdc794dc465645e1997dbe577d8244a7b2a4f40c2757760f50b207 Miraielf gafgyt mirai ua-wget

Intelligence


File Origin
# of uploads :
2
# of downloads :
40
Origin country :
DE DE
Vendor Threat Intelligence
No detections
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
evasive expand lolbin mirai
Verdict:
Malicious
File Type:
unix shell
First seen:
2025-12-16T05:12:00Z UTC
Last seen:
2025-12-17T07:55:00Z UTC
Hits:
~100
Status:
terminated
Behavior Graph:
%3 guuid=419ce364-1800-0000-a9f7-9eea8a0c0000 pid=3210 /usr/bin/sudo guuid=9d4d5467-1800-0000-a9f7-9eea8b0c0000 pid=3211 /tmp/sample.bin guuid=419ce364-1800-0000-a9f7-9eea8a0c0000 pid=3210->guuid=9d4d5467-1800-0000-a9f7-9eea8b0c0000 pid=3211 execve guuid=8990b667-1800-0000-a9f7-9eea8c0c0000 pid=3212 /usr/bin/rm guuid=9d4d5467-1800-0000-a9f7-9eea8b0c0000 pid=3211->guuid=8990b667-1800-0000-a9f7-9eea8c0c0000 pid=3212 execve guuid=e3a72c68-1800-0000-a9f7-9eea8d0c0000 pid=3213 /usr/bin/rm guuid=9d4d5467-1800-0000-a9f7-9eea8b0c0000 pid=3211->guuid=e3a72c68-1800-0000-a9f7-9eea8d0c0000 pid=3213 execve guuid=a8647c68-1800-0000-a9f7-9eea8e0c0000 pid=3214 /usr/bin/rm guuid=9d4d5467-1800-0000-a9f7-9eea8b0c0000 pid=3211->guuid=a8647c68-1800-0000-a9f7-9eea8e0c0000 pid=3214 execve guuid=b321d068-1800-0000-a9f7-9eea8f0c0000 pid=3215 /usr/bin/rm guuid=9d4d5467-1800-0000-a9f7-9eea8b0c0000 pid=3211->guuid=b321d068-1800-0000-a9f7-9eea8f0c0000 pid=3215 execve guuid=b3c31a69-1800-0000-a9f7-9eea900c0000 pid=3216 /usr/bin/rm guuid=9d4d5467-1800-0000-a9f7-9eea8b0c0000 pid=3211->guuid=b3c31a69-1800-0000-a9f7-9eea900c0000 pid=3216 execve guuid=235d6569-1800-0000-a9f7-9eea910c0000 pid=3217 /usr/bin/rm guuid=9d4d5467-1800-0000-a9f7-9eea8b0c0000 pid=3211->guuid=235d6569-1800-0000-a9f7-9eea910c0000 pid=3217 execve guuid=525ddd69-1800-0000-a9f7-9eea920c0000 pid=3218 /usr/bin/rm guuid=9d4d5467-1800-0000-a9f7-9eea8b0c0000 pid=3211->guuid=525ddd69-1800-0000-a9f7-9eea920c0000 pid=3218 execve guuid=731f246a-1800-0000-a9f7-9eea930c0000 pid=3219 /usr/bin/curl net send-data write-file guuid=9d4d5467-1800-0000-a9f7-9eea8b0c0000 pid=3211->guuid=731f246a-1800-0000-a9f7-9eea930c0000 pid=3219 execve guuid=528db9c2-1800-0000-a9f7-9eea260d0000 pid=3366 /usr/bin/chmod guuid=9d4d5467-1800-0000-a9f7-9eea8b0c0000 pid=3211->guuid=528db9c2-1800-0000-a9f7-9eea260d0000 pid=3366 execve guuid=40dd17c3-1800-0000-a9f7-9eea280d0000 pid=3368 /usr/bin/dash guuid=9d4d5467-1800-0000-a9f7-9eea8b0c0000 pid=3211->guuid=40dd17c3-1800-0000-a9f7-9eea280d0000 pid=3368 clone guuid=444e95c3-1800-0000-a9f7-9eea2c0d0000 pid=3372 /usr/bin/curl net send-data write-file guuid=9d4d5467-1800-0000-a9f7-9eea8b0c0000 pid=3211->guuid=444e95c3-1800-0000-a9f7-9eea2c0d0000 pid=3372 execve guuid=47f7b706-1900-0000-a9f7-9eeacd0d0000 pid=3533 /usr/bin/chmod guuid=9d4d5467-1800-0000-a9f7-9eea8b0c0000 pid=3211->guuid=47f7b706-1900-0000-a9f7-9eeacd0d0000 pid=3533 execve guuid=c572f506-1900-0000-a9f7-9eeacf0d0000 pid=3535 /usr/bin/dash guuid=9d4d5467-1800-0000-a9f7-9eea8b0c0000 pid=3211->guuid=c572f506-1900-0000-a9f7-9eeacf0d0000 pid=3535 clone guuid=c4ccaa07-1900-0000-a9f7-9eead30d0000 pid=3539 /usr/bin/curl net send-data write-file guuid=9d4d5467-1800-0000-a9f7-9eea8b0c0000 pid=3211->guuid=c4ccaa07-1900-0000-a9f7-9eead30d0000 pid=3539 execve guuid=e76e084b-1900-0000-a9f7-9eea520e0000 pid=3666 /usr/bin/chmod guuid=9d4d5467-1800-0000-a9f7-9eea8b0c0000 pid=3211->guuid=e76e084b-1900-0000-a9f7-9eea520e0000 pid=3666 execve guuid=0ec56a4b-1900-0000-a9f7-9eea530e0000 pid=3667 /usr/bin/dash guuid=9d4d5467-1800-0000-a9f7-9eea8b0c0000 pid=3211->guuid=0ec56a4b-1900-0000-a9f7-9eea530e0000 pid=3667 clone guuid=ba5c344c-1900-0000-a9f7-9eea590e0000 pid=3673 /usr/bin/curl net send-data write-file guuid=9d4d5467-1800-0000-a9f7-9eea8b0c0000 pid=3211->guuid=ba5c344c-1900-0000-a9f7-9eea590e0000 pid=3673 execve guuid=833e8093-1900-0000-a9f7-9eea0c0f0000 pid=3852 /usr/bin/chmod guuid=9d4d5467-1800-0000-a9f7-9eea8b0c0000 pid=3211->guuid=833e8093-1900-0000-a9f7-9eea0c0f0000 pid=3852 execve guuid=546db793-1900-0000-a9f7-9eea0e0f0000 pid=3854 /usr/bin/dash guuid=9d4d5467-1800-0000-a9f7-9eea8b0c0000 pid=3211->guuid=546db793-1900-0000-a9f7-9eea0e0f0000 pid=3854 clone guuid=00fc3494-1900-0000-a9f7-9eea120f0000 pid=3858 /usr/bin/curl net send-data write-file guuid=9d4d5467-1800-0000-a9f7-9eea8b0c0000 pid=3211->guuid=00fc3494-1900-0000-a9f7-9eea120f0000 pid=3858 execve guuid=f4219de7-1900-0000-a9f7-9eeaeb0f0000 pid=4075 /usr/bin/chmod guuid=9d4d5467-1800-0000-a9f7-9eea8b0c0000 pid=3211->guuid=f4219de7-1900-0000-a9f7-9eeaeb0f0000 pid=4075 execve guuid=cfd20ee8-1900-0000-a9f7-9eeaec0f0000 pid=4076 /usr/bin/dash guuid=9d4d5467-1800-0000-a9f7-9eea8b0c0000 pid=3211->guuid=cfd20ee8-1900-0000-a9f7-9eeaec0f0000 pid=4076 clone guuid=ef4d50e9-1900-0000-a9f7-9eeaf20f0000 pid=4082 /usr/bin/curl net send-data write-file guuid=9d4d5467-1800-0000-a9f7-9eea8b0c0000 pid=3211->guuid=ef4d50e9-1900-0000-a9f7-9eeaf20f0000 pid=4082 execve guuid=05c93a2b-1a00-0000-a9f7-9eea97100000 pid=4247 /usr/bin/chmod guuid=9d4d5467-1800-0000-a9f7-9eea8b0c0000 pid=3211->guuid=05c93a2b-1a00-0000-a9f7-9eea97100000 pid=4247 execve guuid=a8c7b42b-1a00-0000-a9f7-9eea99100000 pid=4249 /usr/bin/dash guuid=9d4d5467-1800-0000-a9f7-9eea8b0c0000 pid=3211->guuid=a8c7b42b-1a00-0000-a9f7-9eea99100000 pid=4249 clone guuid=a20ed02c-1a00-0000-a9f7-9eeaa1100000 pid=4257 /usr/bin/curl net send-data write-file guuid=9d4d5467-1800-0000-a9f7-9eea8b0c0000 pid=3211->guuid=a20ed02c-1a00-0000-a9f7-9eeaa1100000 pid=4257 execve guuid=01840170-1a00-0000-a9f7-9eea56110000 pid=4438 /usr/bin/chmod guuid=9d4d5467-1800-0000-a9f7-9eea8b0c0000 pid=3211->guuid=01840170-1a00-0000-a9f7-9eea56110000 pid=4438 execve guuid=8cac6170-1a00-0000-a9f7-9eea59110000 pid=4441 /usr/bin/dash guuid=9d4d5467-1800-0000-a9f7-9eea8b0c0000 pid=3211->guuid=8cac6170-1a00-0000-a9f7-9eea59110000 pid=4441 clone fd17f377-6c1a-50e8-b822-f55ae4fd390f 103.146.23.241:80 guuid=731f246a-1800-0000-a9f7-9eea930c0000 pid=3219->fd17f377-6c1a-50e8-b822-f55ae4fd390f send: 81B guuid=444e95c3-1800-0000-a9f7-9eea2c0d0000 pid=3372->fd17f377-6c1a-50e8-b822-f55ae4fd390f send: 82B guuid=c4ccaa07-1900-0000-a9f7-9eead30d0000 pid=3539->fd17f377-6c1a-50e8-b822-f55ae4fd390f send: 82B guuid=ba5c344c-1900-0000-a9f7-9eea590e0000 pid=3673->fd17f377-6c1a-50e8-b822-f55ae4fd390f send: 82B guuid=00fc3494-1900-0000-a9f7-9eea120f0000 pid=3858->fd17f377-6c1a-50e8-b822-f55ae4fd390f send: 82B guuid=ef4d50e9-1900-0000-a9f7-9eeaf20f0000 pid=4082->fd17f377-6c1a-50e8-b822-f55ae4fd390f send: 81B guuid=a20ed02c-1a00-0000-a9f7-9eeaa1100000 pid=4257->fd17f377-6c1a-50e8-b822-f55ae4fd390f send: 85B
Threat name:
Document-HTML.Trojan.Vigorf
Status:
Malicious
First seen:
2025-12-16 07:27:17 UTC
File Type:
Text (Shell)
AV detection:
12 of 24 (50.00%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  9/10
Tags:
antivm credential_access defense_evasion discovery linux
Behaviour
Reads runtime system information
System Network Configuration Discovery
Writes file to tmp directory
Changes its process name
Checks CPU configuration
Reads system network configuration
Reads process memory
Enumerates active TCP sockets
Enumerates running processes
File and Directory Permissions Modification
Executes dropped EXE
Renames itself
Unexpected DNS network traffic destination
Contacts a large (17462) amount of remote hosts
Creates a large amount of network flows
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh 7c54df1f3e34ae697a519f2654f25ae7727afc19c3f6d4bd7ad36918496ecf27

(this sample)

  
Delivery method
Distributed via web download

Comments