MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 897e512b856bd2dc9152c6760fd42b7b679792739d5a401c9eef74a95f2be56f. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 9


Intelligence 9 IOCs YARA 2 File information Comments

SHA256 hash: 897e512b856bd2dc9152c6760fd42b7b679792739d5a401c9eef74a95f2be56f
SHA3-384 hash: a88ad36d527979c6cf6084faa120b509f9596243544d5fc3fc74ab6e307a47ff9f1dde93a8f6a7a0bbcf3166bbf767a1
SHA1 hash: 6d1f616bb519e215dc2d0b527594bceb278484be
MD5 hash: 69b5fc30909d71d1490579deeace8c00
humanhash: july-wisconsin-mike-gee
File name:Pandora.sh
Download: download sample
Signature Mirai
File size:2'063 bytes
First seen:2025-12-23 21:12:01 UTC
Last seen:2025-12-24 06:38:23 UTC
File type: sh
MIME type:text/x-shellscript
ssdeep 48:v4XiXe4X1XPo4XadX+4XhMXhVZ0h4XhFXheH4XhqXhpG4XhDXhAV4XXXO4XWX24l:v4XiXe4X1XQ4X6X+4XaX+h4XzXw4X8Xs
TLSH T15B413DFA264114F62EE5DD3371A80404E0C155E5AEC96EC8E4EC24BBB58EDC87188E7B
TrID 70.0% (.SH) Linux/UNIX shell script (7000/1)
30.0% (.) Unix-like shebang (var.3) (gen) (3000/1)
Magika shell
Reporter abuse_ch
Tags:mirai sh
URLMalware sample (SHA256 hash)SignatureTags
http://193.201.82.146/Pandoras_Box/pandora.x863e2f27f3fd8013aed57eea30a2c807e2968cba1a3cf4bc39e8bb83a93d10fd5f Miraimirai opendir
http://193.201.82.146/Pandoras_Box/pandora.mips40f13890c7f9bb19a4a12ae6216f19de4d88c87b20d694912059bad9ca31753f Miraimirai opendir
http://193.201.82.146/Pandoras_Box/pandora.mpslaa37142589fe429705ace834827c2085903b32aa7ef7397c99d9355bbaf349c7 Miraimirai opendir
http://193.201.82.146/Pandoras_Box/pandora.arm4n/an/aelf ua-wget
http://193.201.82.146/Pandoras_Box/pandora.arm52362d89a0b46567403a8f462abf98c8511a9eb66f18827c0b27a255cb2c71264 Miraimirai opendir
http://193.201.82.146/Pandoras_Box/pandora.arm67695a0b23b4c4c0e84c4ffdc302c11a16e58a327cee539cb10727d972d7461d2 Miraimirai opendir
http://193.201.82.146/Pandoras_Box/pandora.arm751199c18cc13dacef97639210426861f862d5bb99562ccabb8136ba102c531da Miraimirai opendir
http://193.201.82.146/Pandoras_Box/pandora.ppcf1285532c415ab571797d7187581c63ab81b375ec29587d6bdd383ed6f868c1a Miraimirai opendir
http://193.201.82.146/Pandoras_Box/pandora.m68k9166a6afa5d5bb71a70c307d76bf8f4efaf6acf3ca0cc4e4fe1b456b7222dc26 Miraimirai opendir
http://193.201.82.146/Pandoras_Box/pandora.sh4977631cbac5039b98c9c04505c5f31cec566244b22fd7e5d44af4f53fb568e96 Miraimirai opendir

Intelligence


File Origin
# of uploads :
2
# of downloads :
32
Origin country :
DE DE
Vendor Threat Intelligence
No detections
Result
Gathering data
Verdict:
Malicious
File Type:
unix shell
Detections:
HEUR:Trojan-Downloader.Shell.Agent.p HEUR:Trojan-Downloader.Shell.Agent.gen HEUR:Trojan-Downloader.Shell.Agent.a
Threat name:
Linux.Downloader.Medusa
Status:
Malicious
First seen:
2025-12-23 21:13:23 UTC
File Type:
Text (Shell)
AV detection:
22 of 36 (61.11%)
Threat level:
  3/5
Result
Malware family:
Score:
  10/10
Tags:
family:mirai botnet:lzrd antivm botnet defense_evasion discovery linux
Behaviour
Reads runtime system information
System Network Configuration Discovery
Writes file to tmp directory
Checks CPU configuration
Reads system network configuration
Enumerates active TCP sockets
Enumerates running processes
File and Directory Permissions Modification
Executes dropped EXE
Modifies Watchdog functionality
Contacts a large (197116) amount of remote hosts
Creates a large amount of network flows
Mirai
Mirai family
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Linux_Shellscript_Downloader
Author:albertzsigovits
Description:Generic Approach to Shellscript downloaders
Rule name:MAL_Linux_IoT_MultiArch_BotnetLoader_Generic
Author:Anish Bogati
Description:Technique-based detection of IoT/Linux botnet loader shell scripts downloading binaries from numeric IPs, chmodding, and executing multi-architecture payloads
Reference:MalwareBazaar sample lilin.sh

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh 897e512b856bd2dc9152c6760fd42b7b679792739d5a401c9eef74a95f2be56f

(this sample)

  
Delivery method
Distributed via web download

Comments