MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 87b9f2286898e179dfc4f632ca6f115abfa56b0edf0e6acf9977fde99656e917. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: 87b9f2286898e179dfc4f632ca6f115abfa56b0edf0e6acf9977fde99656e917
SHA3-384 hash: bb489a8e180c81829d9984b4fe390e9384907b89bb946ae327aae563c96678ba9e8dd3dbaa2e325283cf789c1e884ada
SHA1 hash: a7dc9a3114894ad995cae57a85894254400bbe8c
MD5 hash: 7e8257fe25c854a012ffff7d1e27dcfc
humanhash: mirror-delaware-asparagus-shade
File name:wget.sh
Download: download sample
Signature Mirai
File size:512 bytes
First seen:2026-03-25 09:43:11 UTC
Last seen:Never
File type: sh
MIME type:text/x-shellscript
ssdeep 6:h4dYtqXDRvAwAC2MFNyhpOx0/225LrsH2XCMSYeJwInSb2Xjy5rAOhVU6:KSs6wZzNyHe0uCsH+CMSYeJBO+W5pB
TLSH T113F024CE06943A5044CDCA1FB7938949100583CD168F97C97DDD1A27BA50BE9F488EA8
TrID 70.0% (.SH) Linux/UNIX shell script (7000/1)
30.0% (.) Unix-like shebang (var.3) (gen) (3000/1)
Magika shell
Reporter abuse_ch
Tags:sh
URLMalware sample (SHA256 hash)SignatureTags
http://91.92.241.94/arm512f2181ea8545d7b6deddadaba7d41326371a47e478b4a88dc8e6c1d7011a0cc Miraiarm elf mirai ua-wget
http://91.92.241.94/arm7d6b7bb3baba4a7a97d0fab24faa2165ca4f658a87447761321c77b8cda841a97 Miraiarm elf mirai ua-wget
http://91.92.241.94/mipsd43575a360790d82abc97c75d5e300cd846d9154e4d361f54a01509392a6d586 Miraielf gafgyt mips mirai ua-wget
http://91.92.241.94/mipsel32e4725e4ca7048ac4bd253155778a4ec657c55a5586aa90eda49409a3e7e8d8 Miraielf ua-wget

Intelligence


File Origin
# of uploads :
1
# of downloads :
52
Origin country :
DE DE
Vendor Threat Intelligence
No detections
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
busybox mirai
Result
Gathering data
Verdict:
Malicious
File Type:
unix shell
Detections:
HEUR:Trojan-Downloader.Shell.Agent.p
Status:
terminated
Behavior Graph:
%3 guuid=e03dc248-1800-0000-acd1-cbddf50c0000 pid=3317 /usr/bin/sudo guuid=bec08d4b-1800-0000-acd1-cbddfc0c0000 pid=3324 /tmp/sample.bin guuid=e03dc248-1800-0000-acd1-cbddf50c0000 pid=3317->guuid=bec08d4b-1800-0000-acd1-cbddfc0c0000 pid=3324 execve guuid=24ecd84b-1800-0000-acd1-cbddfd0c0000 pid=3325 /usr/bin/rm guuid=bec08d4b-1800-0000-acd1-cbddfc0c0000 pid=3324->guuid=24ecd84b-1800-0000-acd1-cbddfd0c0000 pid=3325 execve guuid=8fcf7d4c-1800-0000-acd1-cbddfe0c0000 pid=3326 /usr/bin/rm guuid=bec08d4b-1800-0000-acd1-cbddfc0c0000 pid=3324->guuid=8fcf7d4c-1800-0000-acd1-cbddfe0c0000 pid=3326 execve guuid=9118c44c-1800-0000-acd1-cbddff0c0000 pid=3327 /usr/bin/rm guuid=bec08d4b-1800-0000-acd1-cbddfc0c0000 pid=3324->guuid=9118c44c-1800-0000-acd1-cbddff0c0000 pid=3327 execve guuid=04da0d4d-1800-0000-acd1-cbdd000d0000 pid=3328 /usr/bin/rm guuid=bec08d4b-1800-0000-acd1-cbddfc0c0000 pid=3324->guuid=04da0d4d-1800-0000-acd1-cbdd000d0000 pid=3328 execve guuid=ed71544d-1800-0000-acd1-cbdd010d0000 pid=3329 /usr/bin/rm guuid=bec08d4b-1800-0000-acd1-cbddfc0c0000 pid=3324->guuid=ed71544d-1800-0000-acd1-cbdd010d0000 pid=3329 execve guuid=a0d89f4d-1800-0000-acd1-cbdd020d0000 pid=3330 /usr/bin/rm guuid=bec08d4b-1800-0000-acd1-cbddfc0c0000 pid=3324->guuid=a0d89f4d-1800-0000-acd1-cbdd020d0000 pid=3330 execve guuid=5e56e44d-1800-0000-acd1-cbdd030d0000 pid=3331 /usr/bin/rm guuid=bec08d4b-1800-0000-acd1-cbddfc0c0000 pid=3324->guuid=5e56e44d-1800-0000-acd1-cbdd030d0000 pid=3331 execve guuid=ee8d2d4e-1800-0000-acd1-cbdd040d0000 pid=3332 /usr/bin/cp guuid=bec08d4b-1800-0000-acd1-cbddfc0c0000 pid=3324->guuid=ee8d2d4e-1800-0000-acd1-cbdd040d0000 pid=3332 execve guuid=bc580954-1800-0000-acd1-cbdd050d0000 pid=3333 /usr/bin/busybox net send-data write-file guuid=bec08d4b-1800-0000-acd1-cbddfc0c0000 pid=3324->guuid=bc580954-1800-0000-acd1-cbdd050d0000 pid=3333 execve guuid=2aab4166-1800-0000-acd1-cbdd210d0000 pid=3361 /usr/bin/chmod guuid=bec08d4b-1800-0000-acd1-cbddfc0c0000 pid=3324->guuid=2aab4166-1800-0000-acd1-cbdd210d0000 pid=3361 execve guuid=106faf66-1800-0000-acd1-cbdd230d0000 pid=3363 /usr/bin/dash guuid=bec08d4b-1800-0000-acd1-cbddfc0c0000 pid=3324->guuid=106faf66-1800-0000-acd1-cbdd230d0000 pid=3363 clone guuid=f967dc68-1800-0000-acd1-cbdd280d0000 pid=3368 /usr/bin/busybox net send-data write-file guuid=bec08d4b-1800-0000-acd1-cbddfc0c0000 pid=3324->guuid=f967dc68-1800-0000-acd1-cbdd280d0000 pid=3368 execve guuid=755a117b-1800-0000-acd1-cbdd4e0d0000 pid=3406 /usr/bin/chmod guuid=bec08d4b-1800-0000-acd1-cbddfc0c0000 pid=3324->guuid=755a117b-1800-0000-acd1-cbdd4e0d0000 pid=3406 execve guuid=d9d55b7b-1800-0000-acd1-cbdd4f0d0000 pid=3407 /usr/bin/dash guuid=bec08d4b-1800-0000-acd1-cbddfc0c0000 pid=3324->guuid=d9d55b7b-1800-0000-acd1-cbdd4f0d0000 pid=3407 clone guuid=db26eb7b-1800-0000-acd1-cbdd530d0000 pid=3411 /usr/bin/busybox net send-data write-file guuid=bec08d4b-1800-0000-acd1-cbddfc0c0000 pid=3324->guuid=db26eb7b-1800-0000-acd1-cbdd530d0000 pid=3411 execve guuid=2dd8888e-1800-0000-acd1-cbdd920d0000 pid=3474 /usr/bin/chmod guuid=bec08d4b-1800-0000-acd1-cbddfc0c0000 pid=3324->guuid=2dd8888e-1800-0000-acd1-cbdd920d0000 pid=3474 execve guuid=50b4c78e-1800-0000-acd1-cbdd940d0000 pid=3476 /usr/bin/dash guuid=bec08d4b-1800-0000-acd1-cbddfc0c0000 pid=3324->guuid=50b4c78e-1800-0000-acd1-cbdd940d0000 pid=3476 clone guuid=51728e8f-1800-0000-acd1-cbdd990d0000 pid=3481 /usr/bin/busybox net send-data write-file guuid=bec08d4b-1800-0000-acd1-cbddfc0c0000 pid=3324->guuid=51728e8f-1800-0000-acd1-cbdd990d0000 pid=3481 execve guuid=315179a3-1800-0000-acd1-cbddc20d0000 pid=3522 /usr/bin/chmod guuid=bec08d4b-1800-0000-acd1-cbddfc0c0000 pid=3324->guuid=315179a3-1800-0000-acd1-cbddc20d0000 pid=3522 execve guuid=cc05d7a3-1800-0000-acd1-cbddc30d0000 pid=3523 /usr/bin/dash guuid=bec08d4b-1800-0000-acd1-cbddfc0c0000 pid=3324->guuid=cc05d7a3-1800-0000-acd1-cbddc30d0000 pid=3523 clone 59a44c65-0739-58c2-b090-c9afea904369 91.92.241.94:80 guuid=bc580954-1800-0000-acd1-cbdd050d0000 pid=3333->59a44c65-0739-58c2-b090-c9afea904369 send: 79B guuid=f967dc68-1800-0000-acd1-cbdd280d0000 pid=3368->59a44c65-0739-58c2-b090-c9afea904369 send: 79B guuid=db26eb7b-1800-0000-acd1-cbdd530d0000 pid=3411->59a44c65-0739-58c2-b090-c9afea904369 send: 79B guuid=51728e8f-1800-0000-acd1-cbdd990d0000 pid=3481->59a44c65-0739-58c2-b090-c9afea904369 send: 81B
Verdict:
Malicious
Threat:
Trojan-Downloader.Shell.Agent
Threat name:
Win32.Trojan.Sonbokli
Status:
Malicious
First seen:
2026-03-25 09:43:31 UTC
File Type:
Text (Shell)
AV detection:
8 of 36 (22.22%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  9/10
Tags:
defense_evasion discovery linux
Behaviour
Reads runtime system information
System Network Configuration Discovery
Writes file to tmp directory
Changes its process name
Reads system network configuration
Enumerates active TCP sockets
Enumerates running processes
File and Directory Permissions Modification
Executes dropped EXE
Contacts a large (32635) amount of remote hosts
Creates a large amount of network flows
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh 87b9f2286898e179dfc4f632ca6f115abfa56b0edf0e6acf9977fde99656e917

(this sample)

  
Delivery method
Distributed via web download

Comments