MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 86f4c218e84943d522d755ac06bb0b7bfd91244ebc946cb5ad0de8ef78e604d9. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: 86f4c218e84943d522d755ac06bb0b7bfd91244ebc946cb5ad0de8ef78e604d9
SHA3-384 hash: 258358e7ec5b868b9a8a793fc8e7b907ce8e6a6530fb81260b7a5002b64f47cc8c08abeb47d6bfa0a616906d192ebc7e
SHA1 hash: 1dbf23c4b8631c2e35a085fed7f3bd55ffdc577a
MD5 hash: 644de2f9cb961224bc15fe43c8f13074
humanhash: november-september-winter-two
File name:wget.sh
Download: download sample
Signature Mirai
File size:835 bytes
First seen:2025-12-21 09:31:46 UTC
Last seen:Never
File type: sh
MIME type:text/x-shellscript
ssdeep 12:KSs6wZcLcVNyHe0fcHEswc6SYeJB/cLpLcjyncg:KSKZcgV6kHEsfueULpgjycg
TLSH T1D40129CE11846B7585CCD90BFAD3495C14848ACA0BD92BCA3DDC446792C4BD8FB48E68
TrID 70.0% (.SH) Linux/UNIX shell script (7000/1)
30.0% (.) Unix-like shebang (var.3) (gen) (3000/1)
Magika shell
Reporter abuse_ch
Tags:sh
URLMalware sample (SHA256 hash)SignatureTags
http://130.12.180.48/arm45168bc663329c3b1d883b83a59fe84f08b6e01895c37144ddfa9156bea3eaee Mirai32-bit elf mirai Mozi
http://130.12.180.48/arm5c081b0cb0bf6317b1c5a57c3c6c821afc9656185960865bece92b13f5da8817a Miraicensys elf mirai ua-wget
http://130.12.180.48/arm725d009b54cc805f0e3f69e011da81239bfb6422877c1574d62e0fbc988eab49a Miraicensys elf mirai ua-wget
http://130.12.180.48/mipsa04ede576aa16c227ad500289a8c66fdd19fdbff2697ece9a24705418b42b9e0 Mirai32-bit elf mirai Mozi
http://130.12.180.48/mpsl25f528c64b08f744661e0a347d6f8152fa9b76e2f62f42c2351539186cc1dcde Gafgytcensys elf gafgyt ua-wget
http://130.12.180.48/arcb6ee760b9fbfe272a0013850886a8e4e0b4fd824fb44b2a038ce187e8126dece Miraicensys elf mirai ua-wget
http://130.12.180.48/aarch6469008b5e7815c51d3b6d26bb29ebdd82057ee1c853b0368111bd47a3f145ba5f Miraicensys elf mirai ua-wget

Intelligence


File Origin
# of uploads :
1
# of downloads :
36
Origin country :
DE DE
Vendor Threat Intelligence
No detections
Verdict:
Malicious
File Type:
unix shell
First seen:
2025-12-21T06:38:00Z UTC
Last seen:
2025-12-21T12:48:00Z UTC
Hits:
~10
Detections:
HEUR:Trojan-Downloader.Shell.Agent.p
Status:
terminated
Behavior Graph:
%3 guuid=1aa77efd-1d00-0000-128e-321d130b0000 pid=2835 /usr/bin/sudo guuid=b1adbdff-1d00-0000-128e-321d140b0000 pid=2836 /tmp/sample.bin guuid=1aa77efd-1d00-0000-128e-321d130b0000 pid=2835->guuid=b1adbdff-1d00-0000-128e-321d140b0000 pid=2836 execve guuid=f7ccf5ff-1d00-0000-128e-321d150b0000 pid=2837 /usr/bin/rm guuid=b1adbdff-1d00-0000-128e-321d140b0000 pid=2836->guuid=f7ccf5ff-1d00-0000-128e-321d150b0000 pid=2837 execve guuid=80ae9f00-1e00-0000-128e-321d160b0000 pid=2838 /usr/bin/rm guuid=b1adbdff-1d00-0000-128e-321d140b0000 pid=2836->guuid=80ae9f00-1e00-0000-128e-321d160b0000 pid=2838 execve guuid=4b03eb00-1e00-0000-128e-321d170b0000 pid=2839 /usr/bin/rm guuid=b1adbdff-1d00-0000-128e-321d140b0000 pid=2836->guuid=4b03eb00-1e00-0000-128e-321d170b0000 pid=2839 execve guuid=a3502c01-1e00-0000-128e-321d180b0000 pid=2840 /usr/bin/rm guuid=b1adbdff-1d00-0000-128e-321d140b0000 pid=2836->guuid=a3502c01-1e00-0000-128e-321d180b0000 pid=2840 execve guuid=4e326e01-1e00-0000-128e-321d190b0000 pid=2841 /usr/bin/rm guuid=b1adbdff-1d00-0000-128e-321d140b0000 pid=2836->guuid=4e326e01-1e00-0000-128e-321d190b0000 pid=2841 execve guuid=2277cf01-1e00-0000-128e-321d1a0b0000 pid=2842 /usr/bin/rm guuid=b1adbdff-1d00-0000-128e-321d140b0000 pid=2836->guuid=2277cf01-1e00-0000-128e-321d1a0b0000 pid=2842 execve guuid=2c3c1302-1e00-0000-128e-321d1b0b0000 pid=2843 /usr/bin/rm guuid=b1adbdff-1d00-0000-128e-321d140b0000 pid=2836->guuid=2c3c1302-1e00-0000-128e-321d1b0b0000 pid=2843 execve guuid=34097e02-1e00-0000-128e-321d1c0b0000 pid=2844 /usr/bin/cp guuid=b1adbdff-1d00-0000-128e-321d140b0000 pid=2836->guuid=34097e02-1e00-0000-128e-321d1c0b0000 pid=2844 execve guuid=1c608609-1e00-0000-128e-321d230b0000 pid=2851 /usr/bin/busybox net send-data write-file guuid=b1adbdff-1d00-0000-128e-321d140b0000 pid=2836->guuid=1c608609-1e00-0000-128e-321d230b0000 pid=2851 execve guuid=1e27b30d-1e00-0000-128e-321d2c0b0000 pid=2860 /usr/bin/chmod guuid=b1adbdff-1d00-0000-128e-321d140b0000 pid=2836->guuid=1e27b30d-1e00-0000-128e-321d2c0b0000 pid=2860 execve guuid=6ad0f70d-1e00-0000-128e-321d2e0b0000 pid=2862 /usr/bin/dash guuid=b1adbdff-1d00-0000-128e-321d140b0000 pid=2836->guuid=6ad0f70d-1e00-0000-128e-321d2e0b0000 pid=2862 clone guuid=073d4a0f-1e00-0000-128e-321d340b0000 pid=2868 /usr/bin/busybox net send-data write-file guuid=b1adbdff-1d00-0000-128e-321d140b0000 pid=2836->guuid=073d4a0f-1e00-0000-128e-321d340b0000 pid=2868 execve guuid=387c2314-1e00-0000-128e-321d420b0000 pid=2882 /usr/bin/chmod guuid=b1adbdff-1d00-0000-128e-321d140b0000 pid=2836->guuid=387c2314-1e00-0000-128e-321d420b0000 pid=2882 execve guuid=b0e56a14-1e00-0000-128e-321d440b0000 pid=2884 /usr/bin/dash guuid=b1adbdff-1d00-0000-128e-321d140b0000 pid=2836->guuid=b0e56a14-1e00-0000-128e-321d440b0000 pid=2884 clone guuid=af5d3015-1e00-0000-128e-321d480b0000 pid=2888 /usr/bin/busybox net send-data write-file guuid=b1adbdff-1d00-0000-128e-321d140b0000 pid=2836->guuid=af5d3015-1e00-0000-128e-321d480b0000 pid=2888 execve guuid=c93a1d1d-1e00-0000-128e-321d5e0b0000 pid=2910 /usr/bin/chmod guuid=b1adbdff-1d00-0000-128e-321d140b0000 pid=2836->guuid=c93a1d1d-1e00-0000-128e-321d5e0b0000 pid=2910 execve guuid=50bb701d-1e00-0000-128e-321d5f0b0000 pid=2911 /usr/bin/dash guuid=b1adbdff-1d00-0000-128e-321d140b0000 pid=2836->guuid=50bb701d-1e00-0000-128e-321d5f0b0000 pid=2911 clone guuid=4c48c51e-1e00-0000-128e-321d650b0000 pid=2917 /usr/bin/busybox net send-data write-file guuid=b1adbdff-1d00-0000-128e-321d140b0000 pid=2836->guuid=4c48c51e-1e00-0000-128e-321d650b0000 pid=2917 execve guuid=42f7b225-1e00-0000-128e-321d740b0000 pid=2932 /usr/bin/chmod guuid=b1adbdff-1d00-0000-128e-321d140b0000 pid=2836->guuid=42f7b225-1e00-0000-128e-321d740b0000 pid=2932 execve guuid=cdfcf125-1e00-0000-128e-321d760b0000 pid=2934 /usr/bin/dash guuid=b1adbdff-1d00-0000-128e-321d140b0000 pid=2836->guuid=cdfcf125-1e00-0000-128e-321d760b0000 pid=2934 clone guuid=bbe3de26-1e00-0000-128e-321d7b0b0000 pid=2939 /usr/bin/busybox net send-data write-file guuid=b1adbdff-1d00-0000-128e-321d140b0000 pid=2836->guuid=bbe3de26-1e00-0000-128e-321d7b0b0000 pid=2939 execve guuid=0af0272c-1e00-0000-128e-321d7d0b0000 pid=2941 /usr/bin/chmod guuid=b1adbdff-1d00-0000-128e-321d140b0000 pid=2836->guuid=0af0272c-1e00-0000-128e-321d7d0b0000 pid=2941 execve guuid=ce50802c-1e00-0000-128e-321d7e0b0000 pid=2942 /usr/bin/dash guuid=b1adbdff-1d00-0000-128e-321d140b0000 pid=2836->guuid=ce50802c-1e00-0000-128e-321d7e0b0000 pid=2942 clone guuid=3d1f9b2d-1e00-0000-128e-321d830b0000 pid=2947 /usr/bin/busybox net send-data write-file guuid=b1adbdff-1d00-0000-128e-321d140b0000 pid=2836->guuid=3d1f9b2d-1e00-0000-128e-321d830b0000 pid=2947 execve guuid=19f9fc31-1e00-0000-128e-321d8e0b0000 pid=2958 /usr/bin/chmod guuid=b1adbdff-1d00-0000-128e-321d140b0000 pid=2836->guuid=19f9fc31-1e00-0000-128e-321d8e0b0000 pid=2958 execve guuid=04973932-1e00-0000-128e-321d900b0000 pid=2960 /usr/bin/dash guuid=b1adbdff-1d00-0000-128e-321d140b0000 pid=2836->guuid=04973932-1e00-0000-128e-321d900b0000 pid=2960 clone guuid=a22dd433-1e00-0000-128e-321d930b0000 pid=2963 /usr/bin/busybox net send-data write-file guuid=b1adbdff-1d00-0000-128e-321d140b0000 pid=2836->guuid=a22dd433-1e00-0000-128e-321d930b0000 pid=2963 execve guuid=88ef0639-1e00-0000-128e-321d9a0b0000 pid=2970 /usr/bin/chmod guuid=b1adbdff-1d00-0000-128e-321d140b0000 pid=2836->guuid=88ef0639-1e00-0000-128e-321d9a0b0000 pid=2970 execve guuid=51715b39-1e00-0000-128e-321d9b0b0000 pid=2971 /usr/bin/dash guuid=b1adbdff-1d00-0000-128e-321d140b0000 pid=2836->guuid=51715b39-1e00-0000-128e-321d9b0b0000 pid=2971 clone f1acca26-957f-5955-b81d-31f1c555ff4a 130.12.180.48:80 guuid=1c608609-1e00-0000-128e-321d230b0000 pid=2851->f1acca26-957f-5955-b81d-31f1c555ff4a send: 79B guuid=073d4a0f-1e00-0000-128e-321d340b0000 pid=2868->f1acca26-957f-5955-b81d-31f1c555ff4a send: 80B guuid=af5d3015-1e00-0000-128e-321d480b0000 pid=2888->f1acca26-957f-5955-b81d-31f1c555ff4a send: 80B guuid=4c48c51e-1e00-0000-128e-321d650b0000 pid=2917->f1acca26-957f-5955-b81d-31f1c555ff4a send: 80B guuid=bbe3de26-1e00-0000-128e-321d7b0b0000 pid=2939->f1acca26-957f-5955-b81d-31f1c555ff4a send: 80B guuid=3d1f9b2d-1e00-0000-128e-321d830b0000 pid=2947->f1acca26-957f-5955-b81d-31f1c555ff4a send: 79B guuid=a22dd433-1e00-0000-128e-321d930b0000 pid=2963->f1acca26-957f-5955-b81d-31f1c555ff4a send: 83B
Verdict:
Malicious
Threat:
Trojan-Downloader.Shell.Agent
Threat name:
Document-HTML.Trojan.Vigorf
Status:
Malicious
First seen:
2025-12-21 09:32:29 UTC
File Type:
Text (Shell)
AV detection:
12 of 24 (50.00%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  9/10
Tags:
antivm credential_access defense_evasion discovery linux
Behaviour
Reads runtime system information
System Network Configuration Discovery
Writes file to tmp directory
Changes its process name
Checks CPU configuration
Reads system network configuration
Reads process memory
Enumerates active TCP sockets
Enumerates running processes
File and Directory Permissions Modification
Executes dropped EXE
Renames itself
Unexpected DNS network traffic destination
Contacts a large (32285) amount of remote hosts
Creates a large amount of network flows
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh 86f4c218e84943d522d755ac06bb0b7bfd91244ebc946cb5ad0de8ef78e604d9

(this sample)

  
Delivery method
Distributed via web download

Comments