MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 8286493959e557d287d1a9b0ab9d3f9023bdaa9472f10a08662fead778566a29. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: 8286493959e557d287d1a9b0ab9d3f9023bdaa9472f10a08662fead778566a29
SHA3-384 hash: 3a568722412a1992326bfb3e4c8a4dd3d2aba90f1d900300ad7de91b50d2c6ccd1fdc480686bde5014a3757466f77754
SHA1 hash: 3889994c6f49a59b68121c11c1fa81f08a829601
MD5 hash: 7a9248f3420d8b3d6b94ba346aea6254
humanhash: fourteen-summer-carolina-bluebird
File name:bins.sh
Download: download sample
File size:322 bytes
First seen:2026-04-05 17:59:07 UTC
Last seen:Never
File type: sh
MIME type:text/x-shellscript
ssdeep 6:hZ+lfUzB+QFnTAJ3lqLeBsA+fW4nafpzfW4ne5plVyQJfRX50:SRpQFn8J3lf0fzafpzfzgpT1tk
TLSH T1F8E086A2749290329AC9845B955AD49A748124033C86762CA47376718B89164F166FA9
TrID 70.0% (.SH) Linux/UNIX shell script (7000/1)
30.0% (.) Unix-like shebang (var.3) (gen) (3000/1)
Magika shell
Reporter abuse_ch
Tags:sh
URLMalware sample (SHA256 hash)SignatureTags
http://176.65.139.67/release/n/an/an/a

Intelligence


File Origin
# of uploads :
1
# of downloads :
39
Origin country :
DE DE
Vendor Threat Intelligence
Gathering data
Gathering data
Verdict:
Malicious
File Type:
unix shell
First seen:
2026-04-05T15:09:00Z UTC
Last seen:
2026-04-06T08:33:00Z UTC
Hits:
~10
Status:
terminated
Behavior Graph:
%3 guuid=ca540930-1a00-0000-852a-1e7fe5090000 pid=2533 /usr/bin/sudo guuid=aad72e32-1a00-0000-852a-1e7fe7090000 pid=2535 /tmp/sample.bin guuid=ca540930-1a00-0000-852a-1e7fe5090000 pid=2533->guuid=aad72e32-1a00-0000-852a-1e7fe7090000 pid=2535 execve guuid=ab008232-1a00-0000-852a-1e7fe9090000 pid=2537 /usr/bin/wget net send-data write-file guuid=aad72e32-1a00-0000-852a-1e7fe7090000 pid=2535->guuid=ab008232-1a00-0000-852a-1e7fe9090000 pid=2537 execve guuid=1b5b1f3a-1a00-0000-852a-1e7ff8090000 pid=2552 /usr/bin/chmod guuid=aad72e32-1a00-0000-852a-1e7fe7090000 pid=2535->guuid=1b5b1f3a-1a00-0000-852a-1e7ff8090000 pid=2552 execve guuid=aa18643a-1a00-0000-852a-1e7ffa090000 pid=2554 /usr/bin/dash guuid=aad72e32-1a00-0000-852a-1e7fe7090000 pid=2535->guuid=aa18643a-1a00-0000-852a-1e7ffa090000 pid=2554 clone guuid=4907823c-1a00-0000-852a-1e7ffe090000 pid=2558 /usr/bin/wget net send-data write-file guuid=aad72e32-1a00-0000-852a-1e7fe7090000 pid=2535->guuid=4907823c-1a00-0000-852a-1e7ffe090000 pid=2558 execve guuid=3e05cd42-1a00-0000-852a-1e7f0a0a0000 pid=2570 /usr/bin/chmod guuid=aad72e32-1a00-0000-852a-1e7fe7090000 pid=2535->guuid=3e05cd42-1a00-0000-852a-1e7f0a0a0000 pid=2570 execve guuid=39ba1a43-1a00-0000-852a-1e7f0c0a0000 pid=2572 /usr/bin/dash guuid=aad72e32-1a00-0000-852a-1e7fe7090000 pid=2535->guuid=39ba1a43-1a00-0000-852a-1e7f0c0a0000 pid=2572 clone guuid=6f30ca43-1a00-0000-852a-1e7f110a0000 pid=2577 /usr/bin/wget net send-data write-file guuid=aad72e32-1a00-0000-852a-1e7fe7090000 pid=2535->guuid=6f30ca43-1a00-0000-852a-1e7f110a0000 pid=2577 execve guuid=f109024b-1a00-0000-852a-1e7f250a0000 pid=2597 /usr/bin/chmod guuid=aad72e32-1a00-0000-852a-1e7fe7090000 pid=2535->guuid=f109024b-1a00-0000-852a-1e7f250a0000 pid=2597 execve guuid=3919634b-1a00-0000-852a-1e7f260a0000 pid=2598 /usr/bin/dash guuid=aad72e32-1a00-0000-852a-1e7fe7090000 pid=2535->guuid=3919634b-1a00-0000-852a-1e7f260a0000 pid=2598 clone guuid=23ddb24c-1a00-0000-852a-1e7f2c0a0000 pid=2604 /usr/bin/wget net send-data write-file guuid=aad72e32-1a00-0000-852a-1e7fe7090000 pid=2535->guuid=23ddb24c-1a00-0000-852a-1e7f2c0a0000 pid=2604 execve guuid=118ba252-1a00-0000-852a-1e7f3c0a0000 pid=2620 /usr/bin/chmod guuid=aad72e32-1a00-0000-852a-1e7fe7090000 pid=2535->guuid=118ba252-1a00-0000-852a-1e7f3c0a0000 pid=2620 execve guuid=37bdf652-1a00-0000-852a-1e7f3e0a0000 pid=2622 /usr/bin/dash guuid=aad72e32-1a00-0000-852a-1e7fe7090000 pid=2535->guuid=37bdf652-1a00-0000-852a-1e7f3e0a0000 pid=2622 clone guuid=42c59b53-1a00-0000-852a-1e7f410a0000 pid=2625 /usr/bin/wget net send-data write-file guuid=aad72e32-1a00-0000-852a-1e7fe7090000 pid=2535->guuid=42c59b53-1a00-0000-852a-1e7f410a0000 pid=2625 execve guuid=d5fada58-1a00-0000-852a-1e7f500a0000 pid=2640 /usr/bin/chmod guuid=aad72e32-1a00-0000-852a-1e7fe7090000 pid=2535->guuid=d5fada58-1a00-0000-852a-1e7f500a0000 pid=2640 execve guuid=98ee6559-1a00-0000-852a-1e7f520a0000 pid=2642 /tmp/x86 dns net send-data guuid=aad72e32-1a00-0000-852a-1e7fe7090000 pid=2535->guuid=98ee6559-1a00-0000-852a-1e7f520a0000 pid=2642 execve 6c41c2cd-8068-525f-9229-995adab0aeae 176.65.139.67:80 guuid=ab008232-1a00-0000-852a-1e7fe9090000 pid=2537->6c41c2cd-8068-525f-9229-995adab0aeae send: 139B guuid=4907823c-1a00-0000-852a-1e7ffe090000 pid=2558->6c41c2cd-8068-525f-9229-995adab0aeae send: 140B guuid=6f30ca43-1a00-0000-852a-1e7f110a0000 pid=2577->6c41c2cd-8068-525f-9229-995adab0aeae send: 140B guuid=23ddb24c-1a00-0000-852a-1e7f2c0a0000 pid=2604->6c41c2cd-8068-525f-9229-995adab0aeae send: 140B guuid=42c59b53-1a00-0000-852a-1e7f410a0000 pid=2625->6c41c2cd-8068-525f-9229-995adab0aeae send: 139B 8b0a01dc-0728-52c1-8024-c4ba7801b8d6 8.8.8.8:53 guuid=98ee6559-1a00-0000-852a-1e7f520a0000 pid=2642->8b0a01dc-0728-52c1-8024-c4ba7801b8d6 con 5b027a48-7b62-54dd-bd92-302c77ae3608 194.36.144.87:53 guuid=98ee6559-1a00-0000-852a-1e7f520a0000 pid=2642->5b027a48-7b62-54dd-bd92-302c77ae3608 send: 43B e869001f-3f17-57b4-b3d9-c6d27fc575d5 meow.schoolprojectxyz.lol:35342 guuid=98ee6559-1a00-0000-852a-1e7f520a0000 pid=2642->e869001f-3f17-57b4-b3d9-c6d27fc575d5 send: 37B guuid=86971f1a-1e00-0000-852a-1e7fe4120000 pid=4836 /tmp/x86 net send-data guuid=98ee6559-1a00-0000-852a-1e7f520a0000 pid=2642->guuid=86971f1a-1e00-0000-852a-1e7fe4120000 pid=4836 clone 4bc88ce9-86cb-53d5-9261-9ca6ee773521 37.16.74.226:80 guuid=86971f1a-1e00-0000-852a-1e7fe4120000 pid=4836->4bc88ce9-86cb-53d5-9261-9ca6ee773521 send: 5735800B guuid=834f2a1a-1e00-0000-852a-1e7fe5120000 pid=4837 /tmp/x86 guuid=86971f1a-1e00-0000-852a-1e7fe4120000 pid=4836->guuid=834f2a1a-1e00-0000-852a-1e7fe5120000 pid=4837 clone
Threat name:
Script-Shell.Hacktool.MiraiB
Status:
Malicious
First seen:
2026-04-05 18:00:25 UTC
File Type:
Text (Shell)
AV detection:
8 of 38 (21.05%)
Threat level:
  1/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
defense_evasion discovery linux
Behaviour
System Network Configuration Discovery
Writes file to tmp directory
File and Directory Permissions Modification
Executes dropped EXE
Unexpected DNS network traffic destination
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

sh 8286493959e557d287d1a9b0ab9d3f9023bdaa9472f10a08662fead778566a29

(this sample)

  
Delivery method
Distributed via web download

Comments