MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 8af878a537f2591a9b16b45b0b4e420b69a4038522f01967636caefaf6c5cd1c. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 5


Intelligence 5 IOCs YARA 1 File information Comments

SHA256 hash: 8af878a537f2591a9b16b45b0b4e420b69a4038522f01967636caefaf6c5cd1c
SHA3-384 hash: 5bd717f7777d3f8c45344797d95cd2a16ab625c01155b0894e8f8e129a3dca26823bc99dce978a71f6ec074d7ca19ae0
SHA1 hash: c7c83b2048a5d75f0a7ddf4cfd34655579d3a99b
MD5 hash: 10ae2685f82eecdcdb6802e02549a6cb
humanhash: cold-jupiter-uniform-river
File name:wget.sh
Download: download sample
Signature Mirai
File size:1'022 bytes
First seen:2025-12-20 20:15:16 UTC
Last seen:Never
File type: sh
MIME type:text/plain
ssdeep 24:pObgjIXnxNI5n01rKDlUpid+tfspiBCqituk2cxKyvYlTMuA:pegonA0xylkiMtfMiIqiQk2uK68ouA
TLSH T101113ACD2310921AC90CDF483F9D2B2C9759B798E5B48F249CD5097E9E9C609B06BF4B
Magika txt
Reporter abuse_ch
Tags:sh
URLMalware sample (SHA256 hash)SignatureTags
http://143.20.185.78/bins/frost.arm8a6ddd16ceeec5a114f3e8319a225ce5f75cba9225d79855231de0b113472d1f Miraiarm elf geofenced mirai ua-wget USA
http://143.20.185.78/bins/frost.arm598e2d7934b42ebce6ecbdbf56fb8bb1c0335bab4dc8b644404b8d8b41a496543 Miraiarm elf geofenced mirai ua-wget USA
http://143.20.185.78/bins/frost.arm630d1e33d231e28919cf36bf997a44965ad39c7f8dad59484906fd1e8e2826ed4 Miraiarm elf geofenced mirai ua-wget USA
http://143.20.185.78/bins/frost.arm7c9a4f7b1626cfc17d700850cf30703632e96354ae80b1c49532acb3b464d19ec Miraiarm elf geofenced mirai ua-wget USA
http://143.20.185.78/bins/frost.m68kd265fd196d8c4113f2a52dd397cfd60d75c125983f944e4869adf929e78ce039 Miraielf geofenced m68k mirai ua-wget USA
http://143.20.185.78/bins/frost.mips37c634fbfbfce823c3e25f381578336d285b49208ad9bb155493ab2b3923d23a Miraielf geofenced mips mirai ua-wget USA
http://143.20.185.78/bins/frost.mpsl881c736b0ef28f73fd09a7ed06dc6b4935f0a9e95bcd8ad05ed9bd022e3a4a7f Miraielf mirai ua-wget
http://143.20.185.78/bins/frost.ppccf642a2210f02af51797257777169041c7d55d1558d030e36ce69d2321ff8601 Miraielf geofenced mirai PowerPC ua-wget USA
http://143.20.185.78/bins/frost.sh4ab4454e6726ed09e3045755d53d4168e30b74fb5c3f2fb82d472789b65059075 Miraielf geofenced mirai SuperH ua-wget USA
http://143.20.185.78/bins/frost.spc199380dcab2a4acf4d919972002884eff2d01a7e4f1b9228514bf187efef6ff6 Miraielf geofenced mirai sparc ua-wget USA
http://143.20.185.78/bins/frost.x86eec7f66f18d53e7a73987d079bbea53d3cb060b83388fd0d850cff7a5aac1f8e Miraielf geofenced mirai ua-wget USA x86
http://143.20.185.78/bins/frost.x86_642bdb5c71ddc686e9387663a1d114aa12f8c9f5466a47b3da0e9050c6694cd6c4 Miraielf geofenced mirai ua-wget USA x86

Intelligence


File Origin
# of uploads :
1
# of downloads :
35
Origin country :
DE DE
Vendor Threat Intelligence
No detections
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
mirai
Status:
terminated
Behavior Graph:
%3 guuid=e2313b41-1900-0000-31b5-913873140000 pid=5235 /usr/bin/sudo guuid=21460c43-1900-0000-31b5-913875140000 pid=5237 /tmp/sample.bin guuid=e2313b41-1900-0000-31b5-913873140000 pid=5235->guuid=21460c43-1900-0000-31b5-913875140000 pid=5237 execve guuid=99a14b43-1900-0000-31b5-913877140000 pid=5239 /usr/bin/wget net send-data write-file guuid=21460c43-1900-0000-31b5-913875140000 pid=5237->guuid=99a14b43-1900-0000-31b5-913877140000 pid=5239 execve guuid=a32d8a53-1900-0000-31b5-91387d140000 pid=5245 /usr/bin/chmod guuid=21460c43-1900-0000-31b5-913875140000 pid=5237->guuid=a32d8a53-1900-0000-31b5-91387d140000 pid=5245 execve guuid=59931054-1900-0000-31b5-91387e140000 pid=5246 /usr/bin/dash guuid=21460c43-1900-0000-31b5-913875140000 pid=5237->guuid=59931054-1900-0000-31b5-91387e140000 pid=5246 clone guuid=d040f654-1900-0000-31b5-913881140000 pid=5249 /usr/bin/wget net send-data write-file guuid=21460c43-1900-0000-31b5-913875140000 pid=5237->guuid=d040f654-1900-0000-31b5-913881140000 pid=5249 execve guuid=7ad55b6b-1900-0000-31b5-913884140000 pid=5252 /usr/bin/chmod guuid=21460c43-1900-0000-31b5-913875140000 pid=5237->guuid=7ad55b6b-1900-0000-31b5-913884140000 pid=5252 execve guuid=0b2a3c6c-1900-0000-31b5-913885140000 pid=5253 /usr/bin/dash guuid=21460c43-1900-0000-31b5-913875140000 pid=5237->guuid=0b2a3c6c-1900-0000-31b5-913885140000 pid=5253 clone guuid=1a40cc6c-1900-0000-31b5-913887140000 pid=5255 /usr/bin/wget net send-data write-file guuid=21460c43-1900-0000-31b5-913875140000 pid=5237->guuid=1a40cc6c-1900-0000-31b5-913887140000 pid=5255 execve guuid=34a6137b-1900-0000-31b5-913894140000 pid=5268 /usr/bin/chmod guuid=21460c43-1900-0000-31b5-913875140000 pid=5237->guuid=34a6137b-1900-0000-31b5-913894140000 pid=5268 execve guuid=2749827b-1900-0000-31b5-913896140000 pid=5270 /usr/bin/dash guuid=21460c43-1900-0000-31b5-913875140000 pid=5237->guuid=2749827b-1900-0000-31b5-913896140000 pid=5270 clone guuid=cc00317c-1900-0000-31b5-913898140000 pid=5272 /usr/bin/wget net send-data write-file guuid=21460c43-1900-0000-31b5-913875140000 pid=5237->guuid=cc00317c-1900-0000-31b5-913898140000 pid=5272 execve guuid=38ac7f8a-1900-0000-31b5-91389c140000 pid=5276 /usr/bin/chmod guuid=21460c43-1900-0000-31b5-913875140000 pid=5237->guuid=38ac7f8a-1900-0000-31b5-91389c140000 pid=5276 execve guuid=1545c08a-1900-0000-31b5-91389d140000 pid=5277 /usr/bin/dash guuid=21460c43-1900-0000-31b5-913875140000 pid=5237->guuid=1545c08a-1900-0000-31b5-91389d140000 pid=5277 clone guuid=b51f3d8b-1900-0000-31b5-91389f140000 pid=5279 /usr/bin/wget net send-data write-file guuid=21460c43-1900-0000-31b5-913875140000 pid=5237->guuid=b51f3d8b-1900-0000-31b5-91389f140000 pid=5279 execve guuid=51a53b9c-1900-0000-31b5-9138a0140000 pid=5280 /usr/bin/chmod guuid=21460c43-1900-0000-31b5-913875140000 pid=5237->guuid=51a53b9c-1900-0000-31b5-9138a0140000 pid=5280 execve guuid=0a06839c-1900-0000-31b5-9138a1140000 pid=5281 /usr/bin/dash guuid=21460c43-1900-0000-31b5-913875140000 pid=5237->guuid=0a06839c-1900-0000-31b5-9138a1140000 pid=5281 clone guuid=d180179d-1900-0000-31b5-9138a3140000 pid=5283 /usr/bin/wget net send-data write-file guuid=21460c43-1900-0000-31b5-913875140000 pid=5237->guuid=d180179d-1900-0000-31b5-9138a3140000 pid=5283 execve guuid=5cb857ad-1900-0000-31b5-9138a4140000 pid=5284 /usr/bin/chmod guuid=21460c43-1900-0000-31b5-913875140000 pid=5237->guuid=5cb857ad-1900-0000-31b5-9138a4140000 pid=5284 execve guuid=20e59cad-1900-0000-31b5-9138a5140000 pid=5285 /usr/bin/dash guuid=21460c43-1900-0000-31b5-913875140000 pid=5237->guuid=20e59cad-1900-0000-31b5-9138a5140000 pid=5285 clone guuid=fa9226ae-1900-0000-31b5-9138a7140000 pid=5287 /usr/bin/wget net send-data guuid=21460c43-1900-0000-31b5-913875140000 pid=5237->guuid=fa9226ae-1900-0000-31b5-9138a7140000 pid=5287 execve guuid=430e94b5-1900-0000-31b5-9138a8140000 pid=5288 /usr/bin/chmod guuid=21460c43-1900-0000-31b5-913875140000 pid=5237->guuid=430e94b5-1900-0000-31b5-9138a8140000 pid=5288 execve guuid=6dba2ab6-1900-0000-31b5-9138a9140000 pid=5289 /usr/bin/dash guuid=21460c43-1900-0000-31b5-913875140000 pid=5237->guuid=6dba2ab6-1900-0000-31b5-9138a9140000 pid=5289 clone guuid=d44051b6-1900-0000-31b5-9138aa140000 pid=5290 /usr/bin/wget net send-data write-file guuid=21460c43-1900-0000-31b5-913875140000 pid=5237->guuid=d44051b6-1900-0000-31b5-9138aa140000 pid=5290 execve guuid=0f5c87c4-1900-0000-31b5-9138ab140000 pid=5291 /usr/bin/chmod guuid=21460c43-1900-0000-31b5-913875140000 pid=5237->guuid=0f5c87c4-1900-0000-31b5-9138ab140000 pid=5291 execve guuid=a1e6c8c4-1900-0000-31b5-9138ac140000 pid=5292 /usr/bin/dash guuid=21460c43-1900-0000-31b5-913875140000 pid=5237->guuid=a1e6c8c4-1900-0000-31b5-9138ac140000 pid=5292 clone guuid=3d9270c5-1900-0000-31b5-9138ae140000 pid=5294 /usr/bin/wget net send-data write-file guuid=21460c43-1900-0000-31b5-913875140000 pid=5237->guuid=3d9270c5-1900-0000-31b5-9138ae140000 pid=5294 execve guuid=d151abd3-1900-0000-31b5-9138af140000 pid=5295 /usr/bin/chmod guuid=21460c43-1900-0000-31b5-913875140000 pid=5237->guuid=d151abd3-1900-0000-31b5-9138af140000 pid=5295 execve guuid=8f25f5d3-1900-0000-31b5-9138b0140000 pid=5296 /usr/bin/dash guuid=21460c43-1900-0000-31b5-913875140000 pid=5237->guuid=8f25f5d3-1900-0000-31b5-9138b0140000 pid=5296 clone guuid=69117ed4-1900-0000-31b5-9138b2140000 pid=5298 /usr/bin/wget net send-data write-file guuid=21460c43-1900-0000-31b5-913875140000 pid=5237->guuid=69117ed4-1900-0000-31b5-9138b2140000 pid=5298 execve guuid=0486b3e3-1900-0000-31b5-9138b3140000 pid=5299 /usr/bin/chmod guuid=21460c43-1900-0000-31b5-913875140000 pid=5237->guuid=0486b3e3-1900-0000-31b5-9138b3140000 pid=5299 execve guuid=67b8f4e3-1900-0000-31b5-9138b4140000 pid=5300 /usr/bin/dash guuid=21460c43-1900-0000-31b5-913875140000 pid=5237->guuid=67b8f4e3-1900-0000-31b5-9138b4140000 pid=5300 clone guuid=65b479e4-1900-0000-31b5-9138b6140000 pid=5302 /usr/bin/wget net send-data write-file guuid=21460c43-1900-0000-31b5-913875140000 pid=5237->guuid=65b479e4-1900-0000-31b5-9138b6140000 pid=5302 execve guuid=7835c5f3-1900-0000-31b5-9138b7140000 pid=5303 /usr/bin/chmod guuid=21460c43-1900-0000-31b5-913875140000 pid=5237->guuid=7835c5f3-1900-0000-31b5-9138b7140000 pid=5303 execve guuid=c9450af4-1900-0000-31b5-9138b8140000 pid=5304 /home/sandbox/frost.x86 net guuid=21460c43-1900-0000-31b5-913875140000 pid=5237->guuid=c9450af4-1900-0000-31b5-9138b8140000 pid=5304 execve guuid=6353b86b-1a00-0000-31b5-9138bd140000 pid=5309 /usr/bin/wget net send-data write-file guuid=21460c43-1900-0000-31b5-913875140000 pid=5237->guuid=6353b86b-1a00-0000-31b5-9138bd140000 pid=5309 execve guuid=5c928d79-1a00-0000-31b5-9138bf140000 pid=5311 /usr/bin/chmod guuid=21460c43-1900-0000-31b5-913875140000 pid=5237->guuid=5c928d79-1a00-0000-31b5-9138bf140000 pid=5311 execve guuid=18e1e379-1a00-0000-31b5-9138c0140000 pid=5312 /home/sandbox/frost.x86_64 net guuid=21460c43-1900-0000-31b5-913875140000 pid=5237->guuid=18e1e379-1a00-0000-31b5-9138c0140000 pid=5312 execve 697679a7-cc0f-5478-83af-785833bd0767 143.20.185.78:80 guuid=99a14b43-1900-0000-31b5-913877140000 pid=5239->697679a7-cc0f-5478-83af-785833bd0767 send: 142B guuid=d040f654-1900-0000-31b5-913881140000 pid=5249->697679a7-cc0f-5478-83af-785833bd0767 send: 143B guuid=1a40cc6c-1900-0000-31b5-913887140000 pid=5255->697679a7-cc0f-5478-83af-785833bd0767 send: 143B guuid=cc00317c-1900-0000-31b5-913898140000 pid=5272->697679a7-cc0f-5478-83af-785833bd0767 send: 143B guuid=b51f3d8b-1900-0000-31b5-91389f140000 pid=5279->697679a7-cc0f-5478-83af-785833bd0767 send: 143B guuid=d180179d-1900-0000-31b5-9138a3140000 pid=5283->697679a7-cc0f-5478-83af-785833bd0767 send: 143B guuid=fa9226ae-1900-0000-31b5-9138a7140000 pid=5287->697679a7-cc0f-5478-83af-785833bd0767 send: 143B guuid=d44051b6-1900-0000-31b5-9138aa140000 pid=5290->697679a7-cc0f-5478-83af-785833bd0767 send: 142B guuid=3d9270c5-1900-0000-31b5-9138ae140000 pid=5294->697679a7-cc0f-5478-83af-785833bd0767 send: 142B guuid=69117ed4-1900-0000-31b5-9138b2140000 pid=5298->697679a7-cc0f-5478-83af-785833bd0767 send: 142B guuid=65b479e4-1900-0000-31b5-9138b6140000 pid=5302->697679a7-cc0f-5478-83af-785833bd0767 send: 142B 8b0a01dc-0728-52c1-8024-c4ba7801b8d6 8.8.8.8:53 guuid=c9450af4-1900-0000-31b5-9138b8140000 pid=5304->8b0a01dc-0728-52c1-8024-c4ba7801b8d6 con guuid=c8df54f4-1900-0000-31b5-9138b9140000 pid=5305 /home/sandbox/frost.x86 guuid=c9450af4-1900-0000-31b5-9138b8140000 pid=5304->guuid=c8df54f4-1900-0000-31b5-9138b9140000 pid=5305 clone guuid=5aaafc2f-1a00-0000-31b5-9138ba140000 pid=5306 /home/sandbox/frost.x86 guuid=c9450af4-1900-0000-31b5-9138b8140000 pid=5304->guuid=5aaafc2f-1a00-0000-31b5-9138ba140000 pid=5306 clone guuid=0a6da66b-1a00-0000-31b5-9138bb140000 pid=5307 /home/sandbox/frost.x86 guuid=c9450af4-1900-0000-31b5-9138b8140000 pid=5304->guuid=0a6da66b-1a00-0000-31b5-9138bb140000 pid=5307 clone guuid=6defab6b-1a00-0000-31b5-9138bc140000 pid=5308 /home/sandbox/frost.x86 net send-data zombie guuid=c9450af4-1900-0000-31b5-9138b8140000 pid=5304->guuid=6defab6b-1a00-0000-31b5-9138bc140000 pid=5308 clone guuid=6defab6b-1a00-0000-31b5-9138bc140000 pid=5308->8b0a01dc-0728-52c1-8024-c4ba7801b8d6 con a7b3d5bf-498c-5749-9bad-9fa497b96e1d 143.20.185.78:1999 guuid=6defab6b-1a00-0000-31b5-9138bc140000 pid=5308->a7b3d5bf-498c-5749-9bad-9fa497b96e1d send: 600B guuid=7a8fbb6b-1a00-0000-31b5-9138be140000 pid=5310 /home/sandbox/frost.x86 guuid=6defab6b-1a00-0000-31b5-9138bc140000 pid=5308->guuid=7a8fbb6b-1a00-0000-31b5-9138be140000 pid=5310 clone guuid=f68963a7-1a00-0000-31b5-9138c2140000 pid=5314 /home/sandbox/frost.x86 guuid=6defab6b-1a00-0000-31b5-9138bc140000 pid=5308->guuid=f68963a7-1a00-0000-31b5-9138c2140000 pid=5314 clone guuid=53770be3-1a00-0000-31b5-9138c4140000 pid=5316 /home/sandbox/frost.x86 guuid=6defab6b-1a00-0000-31b5-9138bc140000 pid=5308->guuid=53770be3-1a00-0000-31b5-9138c4140000 pid=5316 clone guuid=6353b86b-1a00-0000-31b5-9138bd140000 pid=5309->697679a7-cc0f-5478-83af-785833bd0767 send: 145B guuid=18e1e379-1a00-0000-31b5-9138c0140000 pid=5312->8b0a01dc-0728-52c1-8024-c4ba7801b8d6 con guuid=77cb047a-1a00-0000-31b5-9138c1140000 pid=5313 /home/sandbox/frost.x86_64 guuid=18e1e379-1a00-0000-31b5-9138c0140000 pid=5312->guuid=77cb047a-1a00-0000-31b5-9138c1140000 pid=5313 clone guuid=0ddca9b5-1a00-0000-31b5-9138c3140000 pid=5315 /home/sandbox/frost.x86_64 guuid=18e1e379-1a00-0000-31b5-9138c0140000 pid=5312->guuid=0ddca9b5-1a00-0000-31b5-9138c3140000 pid=5315 clone guuid=172350f1-1a00-0000-31b5-9138c5140000 pid=5317 /home/sandbox/frost.x86_64 zombie guuid=18e1e379-1a00-0000-31b5-9138c0140000 pid=5312->guuid=172350f1-1a00-0000-31b5-9138c5140000 pid=5317 clone guuid=9f4555f1-1a00-0000-31b5-9138c6140000 pid=5318 /home/sandbox/frost.x86_64 net send-data zombie guuid=18e1e379-1a00-0000-31b5-9138c0140000 pid=5312->guuid=9f4555f1-1a00-0000-31b5-9138c6140000 pid=5318 clone guuid=9f4555f1-1a00-0000-31b5-9138c6140000 pid=5318->8b0a01dc-0728-52c1-8024-c4ba7801b8d6 con guuid=9f4555f1-1a00-0000-31b5-9138c6140000 pid=5318->a7b3d5bf-498c-5749-9bad-9fa497b96e1d send: 564B guuid=04b57bf1-1a00-0000-31b5-9138c7140000 pid=5319 /home/sandbox/frost.x86_64 guuid=9f4555f1-1a00-0000-31b5-9138c6140000 pid=5318->guuid=04b57bf1-1a00-0000-31b5-9138c7140000 pid=5319 clone guuid=b96f212d-1b00-0000-31b5-9138c8140000 pid=5320 /home/sandbox/frost.x86_64 guuid=9f4555f1-1a00-0000-31b5-9138c6140000 pid=5318->guuid=b96f212d-1b00-0000-31b5-9138c8140000 pid=5320 clone guuid=42fdc768-1b00-0000-31b5-9138c9140000 pid=5321 /home/sandbox/frost.x86_64 guuid=9f4555f1-1a00-0000-31b5-9138c6140000 pid=5318->guuid=42fdc768-1b00-0000-31b5-9138c9140000 pid=5321 clone
Threat name:
Script-Shell.Downloader.Heuristic
Status:
Malicious
First seen:
2025-12-20 20:15:30 UTC
File Type:
Text (Shell)
AV detection:
13 of 24 (54.17%)
Threat level:
  2/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Modifies registry class
Suspicious use of SetWindowsHookEx
Enumerates physical storage devices
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:MAL_Linux_IoT_MultiArch_BotnetLoader_Generic
Author:Anish Bogati
Description:Technique-based detection of IoT/Linux botnet loader shell scripts downloading binaries from numeric IPs, chmodding, and executing multi-architecture payloads
Reference:MalwareBazaar sample lilin.sh

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh 8af878a537f2591a9b16b45b0b4e420b69a4038522f01967636caefaf6c5cd1c

(this sample)

  
Delivery method
Distributed via web download

Comments