MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 8898a5f34400ad65ccd9bfb9d3f7badac37ce47596cb62908e8b46c28941c5b4. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: 8898a5f34400ad65ccd9bfb9d3f7badac37ce47596cb62908e8b46c28941c5b4
SHA3-384 hash: 537a09a8c3ef3d6429137bf8c52804ffc5cc56b09a34eed74323a58777ac81d2d95f7dbdb3ffd2badafd62273d7721af
SHA1 hash: 182a1da589042a357cff64168c90ceb066225f0c
MD5 hash: 44e94d02fad1acb5dac7c0b6eb9e37e0
humanhash: skylark-grey-maine-east
File name:curl.sh
Download: download sample
Signature Mirai
File size:705 bytes
First seen:2025-12-13 08:55:28 UTC
Last seen:Never
File type: sh
MIME type:text/x-shellscript
ssdeep 12:KhI5W3CtI1/TbNMYwBwBtMYtX1npLOhcMY926M0liAE/MdqlHWMYKoJi5ME3bQA:KOQyS1bbeNBTKX1npLO9gw0liAjdqlVR
TLSH T10D012DC8430477EBD30C8E1FB39345BE1720E2CD58072BD4B38556588685FC5B438962
TrID 70.0% (.SH) Linux/UNIX shell script (7000/1)
30.0% (.) Unix-like shebang (var.3) (gen) (3000/1)
Magika shell
Reporter abuse_ch
Tags:sh
URLMalware sample (SHA256 hash)SignatureTags
http://103.146.122.62/arm32d8f4119792137a9269a36fb23f84aab73f9a932ad897af6655135102e97409 Mirai32-bit elf mirai Mozi
http://103.146.122.62/arm55f139b155ce959a8f2a74f795da448b2a8705f1b00cea3da1ca85b7c977899be Miraielf mirai ua-wget
http://103.146.122.62/arm7c758c08c9126d55348c337ee1b3a6eb90e68e3ffc1ad5ceb9f969faee80b2c0b Miraielf mirai ua-wget
http://103.146.122.62/mipse5c711d405d623a59b267cd234e56b4cbdeb15206b7fc37ed394e64f7762e751 Mirai32-bit elf mirai Mozi
http://103.146.122.62/mpslb2495ee300355d0d9e93340929e9a7de0bcffbf95e6aff5b98f09b3f9fe1c7b6 Miraielf gafgyt mirai ua-wget
http://103.146.122.62/arc376195291aabab3e3bb96a19bd4ada7197cc503f1a2cc43e6ff3a7c45a9e9f83 Miraielf gafgyt mirai ua-wget
http://103.146.122.62/aarch648e2d51bcd5fdc794dc465645e1997dbe577d8244a7b2a4f40c2757760f50b207 Miraielf gafgyt mirai ua-wget

Intelligence


File Origin
# of uploads :
1
# of downloads :
50
Origin country :
DE DE
Vendor Threat Intelligence
No detections
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
evasive expand lolbin mirai
Verdict:
Malicious
File Type:
unix shell
First seen:
2025-12-04T07:23:00Z UTC
Last seen:
2025-12-14T12:08:00Z UTC
Hits:
~100
Threat name:
Document-HTML.Trojan.Vigorf
Status:
Malicious
First seen:
2025-12-02 22:02:16 UTC
File Type:
Text (Shell)
AV detection:
13 of 37 (35.14%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  9/10
Tags:
antivm credential_access defense_evasion discovery linux
Behaviour
Reads runtime system information
System Network Configuration Discovery
Writes file to tmp directory
Changes its process name
Checks CPU configuration
Reads process memory
Enumerates running processes
File and Directory Permissions Modification
Deletes system logs
Executes dropped EXE
Renames itself
Unexpected DNS network traffic destination
Contacts a large (29021) amount of remote hosts
Creates a large amount of network flows
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh 8898a5f34400ad65ccd9bfb9d3f7badac37ce47596cb62908e8b46c28941c5b4

(this sample)

  
Delivery method
Distributed via web download

Comments