MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 88bc27cf8ca6da091db35632ad5ec739c8613d4a14d20a4341a16b74c6c639e1. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 5


Intelligence 5 IOCs YARA File information Comments

SHA256 hash: 88bc27cf8ca6da091db35632ad5ec739c8613d4a14d20a4341a16b74c6c639e1
SHA3-384 hash: 567beb11e43ee186d4bd448b1713558e03a6b7bc7a1a5177da419bff5fb24e5e3940c3e02f6d1b263e8a48eb8216d8e6
SHA1 hash: b03a176a8131e5c55bf1d74608bd2a28ec8300ac
MD5 hash: 3e82ce1bb4fcdcd7f98078e08282ed48
humanhash: charlie-sink-fruit-coffee
File name:w.sh
Download: download sample
Signature Mirai
File size:931 bytes
First seen:2025-11-21 22:14:47 UTC
Last seen:2025-11-22 15:45:37 UTC
File type: sh
MIME type:text/plain
ssdeep 12:k4yXa4y2YEv4y3NIl5B4yc0LKmk4ym+ObD4yjjMN4y9T5k4yCSON4yLty4yEN4yS:cYEfNI7JKU+Kj4T9lxtpzMR
TLSH T10F110ACE226562229480CE74706584B89178EED072688F5EBDCC0CB395D9A29722AF6C
Magika txt
Reporter abuse_ch
Tags:mirai sh
URLMalware sample (SHA256 hash)SignatureTags
http://31.97.147.189/systemcl/arm3e98eef752fb14582bfd0f70e00ae5f1b2e7ccb06b32597053c6ad8f0e591dae Mirai32-bit elf mirai Mozi
http://31.97.147.189/systemcl/arm515c555f6d2014a41eb89f2779f43d1fc11677f501a3219cd3aa72bd0619a2849 Miraiarm elf geofenced mirai ua-wget USA
http://31.97.147.189/systemcl/arm6dfd02ed59c95575642af97a5a34c18ec7be4a61872e339720bba3286d6dbc80d Miraiarm elf geofenced mirai ua-wget USA
http://31.97.147.189/systemcl/arm776f40915e3bbfcd021903f45af774295d1781c327addbcabb3b5bd35da28ecb6 Miraiarm elf geofenced mirai ua-wget USA
http://31.97.147.189/systemcl/m68k452a0c93f439b4eeb230d8a3b2b01934b286283bdcc509cc56f09734f1b667ed Miraielf geofenced m68k mirai ua-wget USA
http://31.97.147.189/systemcl/mipsa5357cb8f6566613be9393a2def399b617ef91c2bc5ead8b8c1ff0f50d3f8dd5 Mirai32-bit elf mirai Mozi
http://31.97.147.189/systemcl/mpsla8e6f02362f973adda0cf4dcbc1c5c3809ee7477a7967287893457b8c5eb02b1 Miraielf geofenced mips mirai ua-wget USA
http://31.97.147.189/systemcl/ppcc3f7cf4b69be7bcc3f70465622a093198c73174902d8dd8dfde516f161ba4569 Miraielf geofenced mirai PowerPC ua-wget USA
http://31.97.147.189/systemcl/sh4n/an/aelf ua-wget
http://31.97.147.189/systemcl/spcn/an/aelf ua-wget
http://31.97.147.189/systemcl/x866f83f9621bd8b0e62a71359b184969f147b0046328455d84a8f20aa1a7ad0fae Mirai32-bit elf mirai Mozi
http://31.97.147.189/systemcl/x86_646f83f9621bd8b0e62a71359b184969f147b0046328455d84a8f20aa1a7ad0fae Miraielf geofenced mirai ua-wget USA x86

Intelligence


File Origin
# of uploads :
2
# of downloads :
42
Origin country :
DE DE
Vendor Threat Intelligence
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
busybox evasive mirai
Status:
terminated
Behavior Graph:
%3 guuid=f8dcadce-1900-0000-17e6-2d4bfd0a0000 pid=2813 /usr/bin/sudo guuid=d3bfc6d0-1900-0000-17e6-2d4b040b0000 pid=2820 /tmp/sample.bin guuid=f8dcadce-1900-0000-17e6-2d4bfd0a0000 pid=2813->guuid=d3bfc6d0-1900-0000-17e6-2d4b040b0000 pid=2820 execve guuid=c1c5fed0-1900-0000-17e6-2d4b050b0000 pid=2821 /usr/bin/busybox net send-data write-file guuid=d3bfc6d0-1900-0000-17e6-2d4b040b0000 pid=2820->guuid=c1c5fed0-1900-0000-17e6-2d4b050b0000 pid=2821 execve guuid=34f14be1-1900-0000-17e6-2d4b280b0000 pid=2856 /usr/bin/chmod guuid=d3bfc6d0-1900-0000-17e6-2d4b040b0000 pid=2820->guuid=34f14be1-1900-0000-17e6-2d4b280b0000 pid=2856 execve guuid=089789e1-1900-0000-17e6-2d4b2a0b0000 pid=2858 /usr/bin/dash guuid=d3bfc6d0-1900-0000-17e6-2d4b040b0000 pid=2820->guuid=089789e1-1900-0000-17e6-2d4b2a0b0000 pid=2858 clone guuid=34a7a1e2-1900-0000-17e6-2d4b2f0b0000 pid=2863 /usr/bin/busybox net send-data write-file guuid=d3bfc6d0-1900-0000-17e6-2d4b040b0000 pid=2820->guuid=34a7a1e2-1900-0000-17e6-2d4b2f0b0000 pid=2863 execve guuid=fadab5f2-1900-0000-17e6-2d4b620b0000 pid=2914 /usr/bin/chmod guuid=d3bfc6d0-1900-0000-17e6-2d4b040b0000 pid=2820->guuid=fadab5f2-1900-0000-17e6-2d4b620b0000 pid=2914 execve guuid=1b00f1f2-1900-0000-17e6-2d4b640b0000 pid=2916 /usr/bin/dash guuid=d3bfc6d0-1900-0000-17e6-2d4b040b0000 pid=2820->guuid=1b00f1f2-1900-0000-17e6-2d4b640b0000 pid=2916 clone guuid=67b57bf3-1900-0000-17e6-2d4b660b0000 pid=2918 /usr/bin/busybox net send-data write-file guuid=d3bfc6d0-1900-0000-17e6-2d4b040b0000 pid=2820->guuid=67b57bf3-1900-0000-17e6-2d4b660b0000 pid=2918 execve guuid=c2d9d607-1a00-0000-17e6-2d4b860b0000 pid=2950 /usr/bin/chmod guuid=d3bfc6d0-1900-0000-17e6-2d4b040b0000 pid=2820->guuid=c2d9d607-1a00-0000-17e6-2d4b860b0000 pid=2950 execve guuid=f6ba3408-1a00-0000-17e6-2d4b880b0000 pid=2952 /usr/bin/dash guuid=d3bfc6d0-1900-0000-17e6-2d4b040b0000 pid=2820->guuid=f6ba3408-1a00-0000-17e6-2d4b880b0000 pid=2952 clone guuid=f6641009-1a00-0000-17e6-2d4b8c0b0000 pid=2956 /usr/bin/busybox net send-data write-file guuid=d3bfc6d0-1900-0000-17e6-2d4b040b0000 pid=2820->guuid=f6641009-1a00-0000-17e6-2d4b8c0b0000 pid=2956 execve guuid=e5084c1e-1a00-0000-17e6-2d4bb10b0000 pid=2993 /usr/bin/chmod guuid=d3bfc6d0-1900-0000-17e6-2d4b040b0000 pid=2820->guuid=e5084c1e-1a00-0000-17e6-2d4bb10b0000 pid=2993 execve guuid=7701e81e-1a00-0000-17e6-2d4bb40b0000 pid=2996 /usr/bin/dash guuid=d3bfc6d0-1900-0000-17e6-2d4b040b0000 pid=2820->guuid=7701e81e-1a00-0000-17e6-2d4bb40b0000 pid=2996 clone guuid=28c45d1f-1a00-0000-17e6-2d4bb80b0000 pid=3000 /usr/bin/busybox net send-data write-file guuid=d3bfc6d0-1900-0000-17e6-2d4b040b0000 pid=2820->guuid=28c45d1f-1a00-0000-17e6-2d4bb80b0000 pid=3000 execve guuid=6b2ccc33-1a00-0000-17e6-2d4be00b0000 pid=3040 /usr/bin/chmod guuid=d3bfc6d0-1900-0000-17e6-2d4b040b0000 pid=2820->guuid=6b2ccc33-1a00-0000-17e6-2d4be00b0000 pid=3040 execve guuid=802f3b34-1a00-0000-17e6-2d4be20b0000 pid=3042 /usr/bin/dash guuid=d3bfc6d0-1900-0000-17e6-2d4b040b0000 pid=2820->guuid=802f3b34-1a00-0000-17e6-2d4be20b0000 pid=3042 clone guuid=e4e62535-1a00-0000-17e6-2d4be60b0000 pid=3046 /usr/bin/busybox net send-data write-file guuid=d3bfc6d0-1900-0000-17e6-2d4b040b0000 pid=2820->guuid=e4e62535-1a00-0000-17e6-2d4be60b0000 pid=3046 execve guuid=884f754a-1a00-0000-17e6-2d4b190c0000 pid=3097 /usr/bin/chmod guuid=d3bfc6d0-1900-0000-17e6-2d4b040b0000 pid=2820->guuid=884f754a-1a00-0000-17e6-2d4b190c0000 pid=3097 execve guuid=2dc8c14a-1a00-0000-17e6-2d4b1b0c0000 pid=3099 /usr/bin/dash guuid=d3bfc6d0-1900-0000-17e6-2d4b040b0000 pid=2820->guuid=2dc8c14a-1a00-0000-17e6-2d4b1b0c0000 pid=3099 clone guuid=771c184d-1a00-0000-17e6-2d4b200c0000 pid=3104 /usr/bin/busybox net send-data write-file guuid=d3bfc6d0-1900-0000-17e6-2d4b040b0000 pid=2820->guuid=771c184d-1a00-0000-17e6-2d4b200c0000 pid=3104 execve guuid=9796b768-1a00-0000-17e6-2d4b620c0000 pid=3170 /usr/bin/chmod guuid=d3bfc6d0-1900-0000-17e6-2d4b040b0000 pid=2820->guuid=9796b768-1a00-0000-17e6-2d4b620c0000 pid=3170 execve guuid=398df968-1a00-0000-17e6-2d4b630c0000 pid=3171 /usr/bin/dash guuid=d3bfc6d0-1900-0000-17e6-2d4b040b0000 pid=2820->guuid=398df968-1a00-0000-17e6-2d4b630c0000 pid=3171 clone guuid=412dc469-1a00-0000-17e6-2d4b650c0000 pid=3173 /usr/bin/busybox net send-data write-file guuid=d3bfc6d0-1900-0000-17e6-2d4b040b0000 pid=2820->guuid=412dc469-1a00-0000-17e6-2d4b650c0000 pid=3173 execve guuid=89aa8678-1a00-0000-17e6-2d4b7f0c0000 pid=3199 /usr/bin/chmod guuid=d3bfc6d0-1900-0000-17e6-2d4b040b0000 pid=2820->guuid=89aa8678-1a00-0000-17e6-2d4b7f0c0000 pid=3199 execve guuid=369dfa78-1a00-0000-17e6-2d4b800c0000 pid=3200 /usr/bin/dash guuid=d3bfc6d0-1900-0000-17e6-2d4b040b0000 pid=2820->guuid=369dfa78-1a00-0000-17e6-2d4b800c0000 pid=3200 clone guuid=9257a779-1a00-0000-17e6-2d4b840c0000 pid=3204 /usr/bin/busybox net send-data guuid=d3bfc6d0-1900-0000-17e6-2d4b040b0000 pid=2820->guuid=9257a779-1a00-0000-17e6-2d4b840c0000 pid=3204 execve guuid=d6a8c384-1a00-0000-17e6-2d4b890c0000 pid=3209 /usr/bin/chmod guuid=d3bfc6d0-1900-0000-17e6-2d4b040b0000 pid=2820->guuid=d6a8c384-1a00-0000-17e6-2d4b890c0000 pid=3209 execve guuid=3dad1b85-1a00-0000-17e6-2d4b8a0c0000 pid=3210 /usr/bin/dash guuid=d3bfc6d0-1900-0000-17e6-2d4b040b0000 pid=2820->guuid=3dad1b85-1a00-0000-17e6-2d4b8a0c0000 pid=3210 clone guuid=44d62a85-1a00-0000-17e6-2d4b8b0c0000 pid=3211 /usr/bin/busybox net send-data guuid=d3bfc6d0-1900-0000-17e6-2d4b040b0000 pid=2820->guuid=44d62a85-1a00-0000-17e6-2d4b8b0c0000 pid=3211 execve guuid=1c2ef58f-1a00-0000-17e6-2d4b970c0000 pid=3223 /usr/bin/chmod guuid=d3bfc6d0-1900-0000-17e6-2d4b040b0000 pid=2820->guuid=1c2ef58f-1a00-0000-17e6-2d4b970c0000 pid=3223 execve guuid=925c3790-1a00-0000-17e6-2d4b990c0000 pid=3225 /usr/bin/dash guuid=d3bfc6d0-1900-0000-17e6-2d4b040b0000 pid=2820->guuid=925c3790-1a00-0000-17e6-2d4b990c0000 pid=3225 clone guuid=8e684290-1a00-0000-17e6-2d4b9a0c0000 pid=3226 /usr/bin/busybox net send-data write-file guuid=d3bfc6d0-1900-0000-17e6-2d4b040b0000 pid=2820->guuid=8e684290-1a00-0000-17e6-2d4b9a0c0000 pid=3226 execve guuid=2c4ce69e-1a00-0000-17e6-2d4bb30c0000 pid=3251 /usr/bin/chmod guuid=d3bfc6d0-1900-0000-17e6-2d4b040b0000 pid=2820->guuid=2c4ce69e-1a00-0000-17e6-2d4bb30c0000 pid=3251 execve guuid=6df34c9f-1a00-0000-17e6-2d4bb40c0000 pid=3252 /home/sandbox/x86 net guuid=d3bfc6d0-1900-0000-17e6-2d4b040b0000 pid=2820->guuid=6df34c9f-1a00-0000-17e6-2d4bb40c0000 pid=3252 execve guuid=cff355c1-1a00-0000-17e6-2d4bcc0c0000 pid=3276 /usr/bin/busybox net send-data write-file guuid=d3bfc6d0-1900-0000-17e6-2d4b040b0000 pid=2820->guuid=cff355c1-1a00-0000-17e6-2d4bcc0c0000 pid=3276 execve guuid=992729d1-1a00-0000-17e6-2d4be20c0000 pid=3298 /usr/bin/chmod guuid=d3bfc6d0-1900-0000-17e6-2d4b040b0000 pid=2820->guuid=992729d1-1a00-0000-17e6-2d4be20c0000 pid=3298 execve guuid=0b1bb4d1-1a00-0000-17e6-2d4be30c0000 pid=3299 /home/sandbox/x86_64 net guuid=d3bfc6d0-1900-0000-17e6-2d4b040b0000 pid=2820->guuid=0b1bb4d1-1a00-0000-17e6-2d4be30c0000 pid=3299 execve guuid=da3822ee-1a00-0000-17e6-2d4b270d0000 pid=3367 /usr/bin/rm delete-file guuid=d3bfc6d0-1900-0000-17e6-2d4b040b0000 pid=2820->guuid=da3822ee-1a00-0000-17e6-2d4b270d0000 pid=3367 execve f1c78202-5927-5cc6-bd07-437634c15960 31.97.147.189:80 guuid=c1c5fed0-1900-0000-17e6-2d4b050b0000 pid=2821->f1c78202-5927-5cc6-bd07-437634c15960 send: 88B guuid=34a7a1e2-1900-0000-17e6-2d4b2f0b0000 pid=2863->f1c78202-5927-5cc6-bd07-437634c15960 send: 89B guuid=67b57bf3-1900-0000-17e6-2d4b660b0000 pid=2918->f1c78202-5927-5cc6-bd07-437634c15960 send: 89B guuid=f6641009-1a00-0000-17e6-2d4b8c0b0000 pid=2956->f1c78202-5927-5cc6-bd07-437634c15960 send: 89B guuid=28c45d1f-1a00-0000-17e6-2d4bb80b0000 pid=3000->f1c78202-5927-5cc6-bd07-437634c15960 send: 89B guuid=e4e62535-1a00-0000-17e6-2d4be60b0000 pid=3046->f1c78202-5927-5cc6-bd07-437634c15960 send: 89B guuid=771c184d-1a00-0000-17e6-2d4b200c0000 pid=3104->f1c78202-5927-5cc6-bd07-437634c15960 send: 89B guuid=412dc469-1a00-0000-17e6-2d4b650c0000 pid=3173->f1c78202-5927-5cc6-bd07-437634c15960 send: 88B guuid=9257a779-1a00-0000-17e6-2d4b840c0000 pid=3204->f1c78202-5927-5cc6-bd07-437634c15960 send: 88B guuid=44d62a85-1a00-0000-17e6-2d4b8b0c0000 pid=3211->f1c78202-5927-5cc6-bd07-437634c15960 send: 88B guuid=8e684290-1a00-0000-17e6-2d4b9a0c0000 pid=3226->f1c78202-5927-5cc6-bd07-437634c15960 send: 88B 8b0a01dc-0728-52c1-8024-c4ba7801b8d6 8.8.8.8:53 guuid=6df34c9f-1a00-0000-17e6-2d4bb40c0000 pid=3252->8b0a01dc-0728-52c1-8024-c4ba7801b8d6 con guuid=256d3bc1-1a00-0000-17e6-2d4bca0c0000 pid=3274 /home/sandbox/x86 guuid=6df34c9f-1a00-0000-17e6-2d4bb40c0000 pid=3252->guuid=256d3bc1-1a00-0000-17e6-2d4bca0c0000 pid=3274 clone guuid=734f42c1-1a00-0000-17e6-2d4bcb0c0000 pid=3275 /home/sandbox/x86 dns net send-data zombie guuid=6df34c9f-1a00-0000-17e6-2d4bb40c0000 pid=3252->guuid=734f42c1-1a00-0000-17e6-2d4bcb0c0000 pid=3275 clone guuid=734f42c1-1a00-0000-17e6-2d4bcb0c0000 pid=3275->8b0a01dc-0728-52c1-8024-c4ba7801b8d6 send: 42B 92baddd7-8a81-534e-9407-4c1f931774f6 ahahahahahajs.unproxy.st:9772 guuid=734f42c1-1a00-0000-17e6-2d4bcb0c0000 pid=3275->92baddd7-8a81-534e-9407-4c1f931774f6 send: 42B guuid=cff355c1-1a00-0000-17e6-2d4bcc0c0000 pid=3276->f1c78202-5927-5cc6-bd07-437634c15960 send: 91B guuid=0b1bb4d1-1a00-0000-17e6-2d4be30c0000 pid=3299->8b0a01dc-0728-52c1-8024-c4ba7801b8d6 con guuid=ab3710ee-1a00-0000-17e6-2d4b250d0000 pid=3365 /home/sandbox/x86_64 zombie guuid=0b1bb4d1-1a00-0000-17e6-2d4be30c0000 pid=3299->guuid=ab3710ee-1a00-0000-17e6-2d4b250d0000 pid=3365 clone guuid=cba414ee-1a00-0000-17e6-2d4b260d0000 pid=3366 /home/sandbox/x86_64 dns net send-data zombie guuid=0b1bb4d1-1a00-0000-17e6-2d4be30c0000 pid=3299->guuid=cba414ee-1a00-0000-17e6-2d4b260d0000 pid=3366 clone guuid=cba414ee-1a00-0000-17e6-2d4b260d0000 pid=3366->8b0a01dc-0728-52c1-8024-c4ba7801b8d6 send: 42B guuid=cba414ee-1a00-0000-17e6-2d4b260d0000 pid=3366->92baddd7-8a81-534e-9407-4c1f931774f6 send: 47B
Threat name:
Linux.Worm.Mirai
Status:
Malicious
First seen:
2025-11-21 13:27:43 UTC
File Type:
Text (Shell)
AV detection:
18 of 38 (47.37%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Modifies registry class
Suspicious use of SetWindowsHookEx
Enumerates physical storage devices
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh 88bc27cf8ca6da091db35632ad5ec739c8613d4a14d20a4341a16b74c6c639e1

(this sample)

  
Delivery method
Distributed via web download

Comments