MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 8a780c4676f45ece3e84ee0b257596fdf8c2a9199ecfa6113fac2e909164d316. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 5


Intelligence 5 IOCs YARA File information Comments

SHA256 hash: 8a780c4676f45ece3e84ee0b257596fdf8c2a9199ecfa6113fac2e909164d316
SHA3-384 hash: f17270c9477afe374c36f41173fe2085f518fae2b6a477aabcf22f628b28620d024a6aed0314241a7283b707765e7ac4
SHA1 hash: dbd1a27aa4d9efe503c3be3bfa967ebeb51b1b20
MD5 hash: 4281a79bd42bfa5380bd5f07409ef3f0
humanhash: oxygen-indigo-juliet-butter
File name:dvr.sh
Download: download sample
Signature Mirai
File size:639 bytes
First seen:2025-07-08 17:25:52 UTC
Last seen:Never
File type: sh
MIME type:text/x-shellscript
ssdeep 12:+XOp3dKU2hCUKAMk8QdqxoXPD3pJvVPDN+/I/PN7IPDEeQ:ohBh9Mk8QoWLptV5+/I/V7ITQ
TLSH T117F07D5DD681DBC09866691CB1C7C219F46BC3EC27D24E58BC1F6A75B84C59CB0325BC
Magika shell
Reporter abuse_ch
Tags:sh
URLMalware sample (SHA256 hash)SignatureTags
http://154.205.133.58/skid.arm4c72b3a3e372704eb64e1f0e9ebd021902928fa8c6df47e15a347fa682d48916 Miraielf mirai ua-wget
http://154.205.133.58/skid.arm5495ce809e735ffcdf61aee835d0dc9201ef56aa045252cfa3e7029aac8a0b891 Miraielf mirai ua-wget
http://154.205.133.58/skid.arm7cac1f84aafd6f3b5d144e2bdad81f759d12515d73fac77cb8ac09678f2c28f52 Miraielf mirai ua-wget

Intelligence


File Origin
# of uploads :
1
# of downloads :
26
Origin country :
DE DE
Vendor Threat Intelligence
Verdict:
Malicious
Score:
92.5%
Tags:
downloader mirai agent hype
Status:
terminated
Behavior Graph:
%3 guuid=489288ad-1900-0000-ce0d-6e1543090000 pid=2371 /usr/bin/sudo guuid=6a7e5faf-1900-0000-ce0d-6e1547090000 pid=2375 /tmp/sample.bin guuid=489288ad-1900-0000-ce0d-6e1543090000 pid=2371->guuid=6a7e5faf-1900-0000-ce0d-6e1547090000 pid=2375 execve guuid=bd0a14b6-1900-0000-ce0d-6e1559090000 pid=2393 /usr/bin/rm guuid=6a7e5faf-1900-0000-ce0d-6e1547090000 pid=2375->guuid=bd0a14b6-1900-0000-ce0d-6e1559090000 pid=2393 execve guuid=c13b9cb6-1900-0000-ce0d-6e155b090000 pid=2395 /usr/bin/wget net send-data write-file guuid=6a7e5faf-1900-0000-ce0d-6e1547090000 pid=2375->guuid=c13b9cb6-1900-0000-ce0d-6e155b090000 pid=2395 execve guuid=81cf11ba-1900-0000-ce0d-6e155f090000 pid=2399 /usr/bin/chmod guuid=6a7e5faf-1900-0000-ce0d-6e1547090000 pid=2375->guuid=81cf11ba-1900-0000-ce0d-6e155f090000 pid=2399 execve guuid=dfb45eba-1900-0000-ce0d-6e1560090000 pid=2400 /usr/bin/dash guuid=6a7e5faf-1900-0000-ce0d-6e1547090000 pid=2375->guuid=dfb45eba-1900-0000-ce0d-6e1560090000 pid=2400 clone guuid=e6fa05bb-1900-0000-ce0d-6e1562090000 pid=2402 /usr/bin/rm guuid=6a7e5faf-1900-0000-ce0d-6e1547090000 pid=2375->guuid=e6fa05bb-1900-0000-ce0d-6e1562090000 pid=2402 execve guuid=ac104dbb-1900-0000-ce0d-6e1563090000 pid=2403 /usr/bin/wget net send-data write-file guuid=6a7e5faf-1900-0000-ce0d-6e1547090000 pid=2375->guuid=ac104dbb-1900-0000-ce0d-6e1563090000 pid=2403 execve guuid=0390b6be-1900-0000-ce0d-6e1565090000 pid=2405 /usr/bin/chmod guuid=6a7e5faf-1900-0000-ce0d-6e1547090000 pid=2375->guuid=0390b6be-1900-0000-ce0d-6e1565090000 pid=2405 execve guuid=3941f7be-1900-0000-ce0d-6e1567090000 pid=2407 /usr/bin/dash guuid=6a7e5faf-1900-0000-ce0d-6e1547090000 pid=2375->guuid=3941f7be-1900-0000-ce0d-6e1567090000 pid=2407 clone guuid=bc17cfc0-1900-0000-ce0d-6e156d090000 pid=2413 /usr/bin/rm guuid=6a7e5faf-1900-0000-ce0d-6e1547090000 pid=2375->guuid=bc17cfc0-1900-0000-ce0d-6e156d090000 pid=2413 execve guuid=76b902c1-1900-0000-ce0d-6e156e090000 pid=2414 /usr/bin/wget net send-data write-file guuid=6a7e5faf-1900-0000-ce0d-6e1547090000 pid=2375->guuid=76b902c1-1900-0000-ce0d-6e156e090000 pid=2414 execve guuid=85ad9fc4-1900-0000-ce0d-6e1575090000 pid=2421 /usr/bin/chmod guuid=6a7e5faf-1900-0000-ce0d-6e1547090000 pid=2375->guuid=85ad9fc4-1900-0000-ce0d-6e1575090000 pid=2421 execve guuid=eda7f5c4-1900-0000-ce0d-6e1577090000 pid=2423 /usr/bin/dash guuid=6a7e5faf-1900-0000-ce0d-6e1547090000 pid=2375->guuid=eda7f5c4-1900-0000-ce0d-6e1577090000 pid=2423 clone a6b092b1-7e1c-56ee-bf44-eccdde92b493 154.205.133.58:80 guuid=c13b9cb6-1900-0000-ce0d-6e155b090000 pid=2395->a6b092b1-7e1c-56ee-bf44-eccdde92b493 send: 137B guuid=ac104dbb-1900-0000-ce0d-6e1563090000 pid=2403->a6b092b1-7e1c-56ee-bf44-eccdde92b493 send: 138B guuid=76b902c1-1900-0000-ce0d-6e156e090000 pid=2414->a6b092b1-7e1c-56ee-bf44-eccdde92b493 send: 138B
Threat name:
Script.Trojan.Multiverze
Status:
Malicious
First seen:
2025-07-08 17:26:28 UTC
File Type:
Text (Shell)
AV detection:
12 of 24 (50.00%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
credential_access defense_evasion discovery linux
Behaviour
Reads runtime system information
Writes file to tmp directory
Changes its process name
Reads process memory
Enumerates running processes
File and Directory Permissions Modification
Executes dropped EXE
Renames itself
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh 8a780c4676f45ece3e84ee0b257596fdf8c2a9199ecfa6113fac2e909164d316

(this sample)

  
Delivery method
Distributed via web download

Comments