MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 7d17c2568f3d462292b10d4f73845f70cd4d43f1d0ae94a9e595aee27834324d. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 9


Intelligence 9 IOCs YARA 1 File information Comments

SHA256 hash: 7d17c2568f3d462292b10d4f73845f70cd4d43f1d0ae94a9e595aee27834324d
SHA3-384 hash: 427d2237de23083d917005b4d536f6b2bc1abe9f5e884c8d12eadeb84203a84f2676737e9e36ee2f618d5f389e49e594
SHA1 hash: ad378a579571c56a9ecb588fb960b48580041a07
MD5 hash: 53f96c4306ea66c0710a40bcfdcfcf3f
humanhash: cola-river-kilo-avocado
File name:tplink.sh
Download: download sample
Signature Mirai
File size:1'264 bytes
First seen:2026-02-03 19:59:14 UTC
Last seen:2026-02-04 10:36:55 UTC
File type: sh
MIME type:text/x-shellscript
ssdeep 24:boWBG05pELMk0aptjD0KRURUBP3iIxxKrrFmatkk0:boGGMpzaVuiBP3iIxxnat/0
TLSH T1AB217CDF159A37614C8BCF75B1574968B10EA7E22192DE98F98E2863BDC4E403444F21
TrID 70.0% (.SH) Linux/UNIX shell script (7000/1)
30.0% (.) Unix-like shebang (var.3) (gen) (3000/1)
Magika shell
Reporter abuse_ch
Tags:mirai sh
URLMalware sample (SHA256 hash)SignatureTags
http://91.92.242.13/mips2e3e7be8d40ee0b3614553d271ae3570c91e28e1c92a4cc87cfad2d74916f8c4 Miraielf geofenced mips mirai opendir ua-wget USA
http://91.92.242.13/mipseln/an/aelf ua-wget
http://91.92.242.13/arm4fe75d377cef1bc619904f107a1686c914340532dab020a53d99de4ac68ced47a Miraiarm elf geofenced mirai opendir ua-wget USA
http://91.92.242.13/arm5cc1d3e676b7a1f8a2957593809741e305b53175206970f9e92aed74a20a077d8 Miraiarm elf geofenced mirai opendir ua-wget USA
http://91.92.242.13/arm789e1474abd79dbfed5c1f4f47150d8a1da3ff02c01f3ffd79aeafb1a7d0a21f3 Miraiarm elf geofenced mirai opendir ua-wget USA
http://91.92.242.13/x8628e9a3fee5786f96a02170a4959f7250101feaed551e27b146cd5f27a6b70f2c Miraielf geofenced mirai opendir ua-wget USA x86
http://91.92.242.13/aarch64n/an/aelf ua-wget

Intelligence


File Origin
# of uploads :
2
# of downloads :
55
Origin country :
DE DE
Vendor Threat Intelligence
No detections
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
busybox mirai
Verdict:
Malicious
File Type:
unix shell
First seen:
2026-02-03T17:22:00Z UTC
Last seen:
2026-02-04T05:57:00Z UTC
Hits:
~10
Detections:
HEUR:Trojan-Downloader.Shell.Agent.a
Status:
terminated
Behavior Graph:
%3 guuid=87b1e0d3-1700-0000-ce02-ff5f4b0b0000 pid=2891 /usr/bin/sudo guuid=7856aed6-1700-0000-ce02-ff5f520b0000 pid=2898 /tmp/sample.bin guuid=87b1e0d3-1700-0000-ce02-ff5f4b0b0000 pid=2891->guuid=7856aed6-1700-0000-ce02-ff5f520b0000 pid=2898 execve guuid=962b6657-1800-0000-ce02-ff5f530c0000 pid=3155 /usr/bin/rm guuid=7856aed6-1700-0000-ce02-ff5f520b0000 pid=2898->guuid=962b6657-1800-0000-ce02-ff5f530c0000 pid=3155 execve guuid=538ac757-1800-0000-ce02-ff5f550c0000 pid=3157 /usr/bin/wget net send-data write-file guuid=7856aed6-1700-0000-ce02-ff5f520b0000 pid=2898->guuid=538ac757-1800-0000-ce02-ff5f550c0000 pid=3157 execve guuid=a26c5d67-1800-0000-ce02-ff5f680c0000 pid=3176 /usr/bin/chmod guuid=7856aed6-1700-0000-ce02-ff5f520b0000 pid=2898->guuid=a26c5d67-1800-0000-ce02-ff5f680c0000 pid=3176 execve guuid=08ba1b68-1800-0000-ce02-ff5f690c0000 pid=3177 /usr/bin/dash guuid=7856aed6-1700-0000-ce02-ff5f520b0000 pid=2898->guuid=08ba1b68-1800-0000-ce02-ff5f690c0000 pid=3177 clone guuid=00085769-1800-0000-ce02-ff5f6b0c0000 pid=3179 /usr/bin/wget net send-data guuid=7856aed6-1700-0000-ce02-ff5f520b0000 pid=2898->guuid=00085769-1800-0000-ce02-ff5f6b0c0000 pid=3179 execve guuid=df952f71-1800-0000-ce02-ff5f6c0c0000 pid=3180 /usr/bin/busybox net send-data guuid=7856aed6-1700-0000-ce02-ff5f520b0000 pid=2898->guuid=df952f71-1800-0000-ce02-ff5f6c0c0000 pid=3180 execve guuid=4ef0da77-1800-0000-ce02-ff5f700c0000 pid=3184 /usr/bin/chmod guuid=7856aed6-1700-0000-ce02-ff5f520b0000 pid=2898->guuid=4ef0da77-1800-0000-ce02-ff5f700c0000 pid=3184 execve guuid=47ca4178-1800-0000-ce02-ff5f720c0000 pid=3186 /usr/bin/dash guuid=7856aed6-1700-0000-ce02-ff5f520b0000 pid=2898->guuid=47ca4178-1800-0000-ce02-ff5f720c0000 pid=3186 clone guuid=60d84d78-1800-0000-ce02-ff5f740c0000 pid=3188 /usr/bin/wget net send-data write-file guuid=7856aed6-1700-0000-ce02-ff5f520b0000 pid=2898->guuid=60d84d78-1800-0000-ce02-ff5f740c0000 pid=3188 execve guuid=119e4182-1800-0000-ce02-ff5f8c0c0000 pid=3212 /usr/bin/chmod guuid=7856aed6-1700-0000-ce02-ff5f520b0000 pid=2898->guuid=119e4182-1800-0000-ce02-ff5f8c0c0000 pid=3212 execve guuid=407c9d82-1800-0000-ce02-ff5f8e0c0000 pid=3214 /usr/bin/dash guuid=7856aed6-1700-0000-ce02-ff5f520b0000 pid=2898->guuid=407c9d82-1800-0000-ce02-ff5f8e0c0000 pid=3214 clone guuid=473a6983-1800-0000-ce02-ff5f930c0000 pid=3219 /usr/bin/wget net send-data write-file guuid=7856aed6-1700-0000-ce02-ff5f520b0000 pid=2898->guuid=473a6983-1800-0000-ce02-ff5f930c0000 pid=3219 execve guuid=aca44a8e-1800-0000-ce02-ff5f980c0000 pid=3224 /usr/bin/chmod guuid=7856aed6-1700-0000-ce02-ff5f520b0000 pid=2898->guuid=aca44a8e-1800-0000-ce02-ff5f980c0000 pid=3224 execve guuid=9e65f18e-1800-0000-ce02-ff5f990c0000 pid=3225 /usr/bin/dash guuid=7856aed6-1700-0000-ce02-ff5f520b0000 pid=2898->guuid=9e65f18e-1800-0000-ce02-ff5f990c0000 pid=3225 clone guuid=15d11591-1800-0000-ce02-ff5f9b0c0000 pid=3227 /usr/bin/wget net send-data write-file guuid=7856aed6-1700-0000-ce02-ff5f520b0000 pid=2898->guuid=15d11591-1800-0000-ce02-ff5f9b0c0000 pid=3227 execve guuid=554635a0-1800-0000-ce02-ff5fae0c0000 pid=3246 /usr/bin/chmod guuid=7856aed6-1700-0000-ce02-ff5f520b0000 pid=2898->guuid=554635a0-1800-0000-ce02-ff5fae0c0000 pid=3246 execve guuid=d114caa0-1800-0000-ce02-ff5fb00c0000 pid=3248 /usr/bin/dash guuid=7856aed6-1700-0000-ce02-ff5f520b0000 pid=2898->guuid=d114caa0-1800-0000-ce02-ff5fb00c0000 pid=3248 clone guuid=98e888a1-1800-0000-ce02-ff5fb40c0000 pid=3252 /usr/bin/wget net send-data write-file guuid=7856aed6-1700-0000-ce02-ff5f520b0000 pid=2898->guuid=98e888a1-1800-0000-ce02-ff5fb40c0000 pid=3252 execve guuid=96d67bac-1800-0000-ce02-ff5fbb0c0000 pid=3259 /usr/bin/chmod guuid=7856aed6-1700-0000-ce02-ff5f520b0000 pid=2898->guuid=96d67bac-1800-0000-ce02-ff5fbb0c0000 pid=3259 execve guuid=ccc7b6ac-1800-0000-ce02-ff5fbd0c0000 pid=3261 /tmp/x86 net guuid=7856aed6-1700-0000-ce02-ff5f520b0000 pid=2898->guuid=ccc7b6ac-1800-0000-ce02-ff5fbd0c0000 pid=3261 execve guuid=9453deac-1800-0000-ce02-ff5fbf0c0000 pid=3263 /usr/bin/wget net send-data guuid=7856aed6-1700-0000-ce02-ff5f520b0000 pid=2898->guuid=9453deac-1800-0000-ce02-ff5fbf0c0000 pid=3263 execve guuid=4d81f3b3-1800-0000-ce02-ff5fce0c0000 pid=3278 /usr/bin/busybox net send-data guuid=7856aed6-1700-0000-ce02-ff5f520b0000 pid=2898->guuid=4d81f3b3-1800-0000-ce02-ff5fce0c0000 pid=3278 execve guuid=08fca5ba-1800-0000-ce02-ff5fd00c0000 pid=3280 /usr/bin/chmod guuid=7856aed6-1700-0000-ce02-ff5f520b0000 pid=2898->guuid=08fca5ba-1800-0000-ce02-ff5fd00c0000 pid=3280 execve guuid=fef80bbb-1800-0000-ce02-ff5fd20c0000 pid=3282 /usr/bin/dash guuid=7856aed6-1700-0000-ce02-ff5f520b0000 pid=2898->guuid=fef80bbb-1800-0000-ce02-ff5fd20c0000 pid=3282 clone 2e67b43e-b793-5791-9440-775ab595a903 91.92.242.13:80 guuid=538ac757-1800-0000-ce02-ff5f550c0000 pid=3157->2e67b43e-b793-5791-9440-775ab595a903 send: 131B guuid=00085769-1800-0000-ce02-ff5f6b0c0000 pid=3179->2e67b43e-b793-5791-9440-775ab595a903 send: 133B guuid=df952f71-1800-0000-ce02-ff5f6c0c0000 pid=3180->2e67b43e-b793-5791-9440-775ab595a903 send: 81B guuid=60d84d78-1800-0000-ce02-ff5f740c0000 pid=3188->2e67b43e-b793-5791-9440-775ab595a903 send: 131B guuid=473a6983-1800-0000-ce02-ff5f930c0000 pid=3219->2e67b43e-b793-5791-9440-775ab595a903 send: 131B guuid=15d11591-1800-0000-ce02-ff5f9b0c0000 pid=3227->2e67b43e-b793-5791-9440-775ab595a903 send: 131B guuid=98e888a1-1800-0000-ce02-ff5fb40c0000 pid=3252->2e67b43e-b793-5791-9440-775ab595a903 send: 130B 8b0a01dc-0728-52c1-8024-c4ba7801b8d6 8.8.8.8:53 guuid=ccc7b6ac-1800-0000-ce02-ff5fbd0c0000 pid=3261->8b0a01dc-0728-52c1-8024-c4ba7801b8d6 con guuid=a073d8ac-1800-0000-ce02-ff5fbe0c0000 pid=3262 /tmp/x86 net send-data zombie guuid=ccc7b6ac-1800-0000-ce02-ff5fbd0c0000 pid=3261->guuid=a073d8ac-1800-0000-ce02-ff5fbe0c0000 pid=3262 clone guuid=a073d8ac-1800-0000-ce02-ff5fbe0c0000 pid=3262->8b0a01dc-0728-52c1-8024-c4ba7801b8d6 con 83708861-7158-5fe5-bbac-31d99923e768 178.16.54.17:65521 guuid=a073d8ac-1800-0000-ce02-ff5fbe0c0000 pid=3262->83708861-7158-5fe5-bbac-31d99923e768 send: 16B guuid=9453deac-1800-0000-ce02-ff5fbf0c0000 pid=3263->2e67b43e-b793-5791-9440-775ab595a903 send: 134B guuid=4d81f3b3-1800-0000-ce02-ff5fce0c0000 pid=3278->2e67b43e-b793-5791-9440-775ab595a903 send: 82B
Threat name:
Linux.Trojan.Vigorf
Status:
Malicious
First seen:
2026-02-02 19:12:07 UTC
File Type:
Text (Shell)
AV detection:
13 of 24 (54.17%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:mirai botnet:botnet botnet credential_access defense_evasion discovery linux
Behaviour
Reads runtime system information
System Network Configuration Discovery
Writes file to tmp directory
Changes its process name
Reads system network configuration
Reads process memory
Enumerates active TCP sockets
Enumerates running processes
File and Directory Permissions Modification
Executes dropped EXE
Modifies Watchdog functionality
Mirai
Mirai family
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:MAL_Linux_IoT_MultiArch_BotnetLoader_Generic
Author:Anish Bogati
Description:Technique-based detection of IoT/Linux botnet loader shell scripts downloading binaries from numeric IPs, chmodding, and executing multi-architecture payloads
Reference:MalwareBazaar sample lilin.sh

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh 7d17c2568f3d462292b10d4f73845f70cd4d43f1d0ae94a9e595aee27834324d

(this sample)

  
Delivery method
Distributed via web download

Comments