MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 8b8aadf5236c1280e0fe9699cfe8e32833a67dcdf9bc908eeced1981ef3c0dab. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 7


Intelligence 7 IOCs YARA 1 File information Comments

SHA256 hash: 8b8aadf5236c1280e0fe9699cfe8e32833a67dcdf9bc908eeced1981ef3c0dab
SHA3-384 hash: 5c0e6493d2c3d0227c49ae55d24e94a88ea64b237a85e2304e914c2d8ef81437aeb28e89bb202b164b901e4cbcc792e1
SHA1 hash: 3aae8733ce0e4ec1fae2ca6bd1371adbf891caf0
MD5 hash: 01587a8474cd2d2369837ee520b2b875
humanhash: mars-yellow-low-vermont
File name:sora.sh
Download: download sample
Signature Mirai
File size:690 bytes
First seen:2026-01-13 16:07:41 UTC
Last seen:Never
File type: sh
MIME type:text/plain
ssdeep 12:EkJzb3VkJzwokJzP5OGBkJzDNI1ikJzGmBkJzBTgy1nkJz7ZBkJzKbABkJzfbkJs:7JviJaJXOJvNI7J/OJlTxKJxOJ6AOJE2
TLSH T1230178CF731A7302CB735EEC3D7384A4A255C3C06A54AA06F5AC093682CF7457125AAA
Magika batch
Reporter abuse_ch
Tags:sh
URLMalware sample (SHA256 hash)SignatureTags
http://41.216.188.162/bins/sora.mipsfd47ac5697fd193a1ba1a5c3fc6f1004a033ae0e9e71cc0538405376285c8873 Miraielf mirai ua-wget
http://41.216.188.162/bins/sora.arm3a22c5730cfc5279e2214d547fc6b56e9f23810631892e7d98189e731af22dc5 Miraielf mirai ua-wget
http://41.216.188.162/bins/sora.arm5d1eeae10cb0d111334401e509e60587ef0d47384211838e6613c0444c9139961 Miraielf mirai ua-wget
http://41.216.188.162/bins/sora.arm66697bc6b3dd7e0cad077af8503e4f95f63d16d11f6f8daa2ffd67c3685b4549b Miraielf mirai ua-wget
http://41.216.188.162/bins/sora.m68kac7cf4dde0137453a2e97d321691555a36b3f738ff65a68053c12aeeae03fa91 Miraielf mirai ua-wget
http://41.216.188.162/bins/sora.mpslafd2a7cafac399a43b202588f912b1b139302cdf4ee6df73afbce91edbd4c6da Miraielf mirai ua-wget
http://41.216.188.162/bins/sora.ppc2b80d927771a7311165a27dbf92bc66f7360e892b2374d8dbb19ef8e43e591a0 Miraielf mirai ua-wget
http://41.216.188.162/bins/sora.spc2d1a238467edfb03fae8122510835697d423319cc5ccb022b1b0ed4175724499 Miraielf mirai ua-wget
http://41.216.188.162/bins/sora.sh4247ae5158b6a34148c244755e9aa2bb6fd7727719af000e8d7543b73dc87759d Miraielf mirai ua-wget
http://41.216.188.162/bins/sora.x86ad0c39dff07834a302dd1f44bb682e26ceebcc77f31f124e955e7fc1f6d12bda Miraielf mirai ua-wget

Intelligence


File Origin
# of uploads :
1
# of downloads :
37
Origin country :
DE DE
Vendor Threat Intelligence
No detections
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
mirai
Verdict:
Malicious
File Type:
unix shell
First seen:
2026-01-13T13:20:00Z UTC
Last seen:
2026-01-13T23:44:00Z UTC
Hits:
~10
Detections:
HEUR:Trojan-Downloader.Shell.Agent.gen HEUR:Trojan-Downloader.Shell.Agent.c HEUR:Trojan-Downloader.Shell.Agent.a
Status:
terminated
Behavior Graph:
%3 guuid=6afdd28a-1a00-0000-0098-b93d8c090000 pid=2444 /usr/bin/sudo guuid=4b5d3c8d-1a00-0000-0098-b93d95090000 pid=2453 /tmp/sample.bin guuid=6afdd28a-1a00-0000-0098-b93d8c090000 pid=2444->guuid=4b5d3c8d-1a00-0000-0098-b93d95090000 pid=2453 execve guuid=efc9928d-1a00-0000-0098-b93d97090000 pid=2455 /usr/bin/wget net send-data write-file guuid=4b5d3c8d-1a00-0000-0098-b93d95090000 pid=2453->guuid=efc9928d-1a00-0000-0098-b93d97090000 pid=2455 execve guuid=f736cf95-1a00-0000-0098-b93da6090000 pid=2470 /usr/bin/chmod guuid=4b5d3c8d-1a00-0000-0098-b93d95090000 pid=2453->guuid=f736cf95-1a00-0000-0098-b93da6090000 pid=2470 execve guuid=23be1696-1a00-0000-0098-b93da8090000 pid=2472 /usr/bin/dash guuid=4b5d3c8d-1a00-0000-0098-b93d95090000 pid=2453->guuid=23be1696-1a00-0000-0098-b93da8090000 pid=2472 clone guuid=b6d52096-1a00-0000-0098-b93da9090000 pid=2473 /usr/bin/wget net send-data write-file guuid=4b5d3c8d-1a00-0000-0098-b93d95090000 pid=2453->guuid=b6d52096-1a00-0000-0098-b93da9090000 pid=2473 execve guuid=9b6f119a-1a00-0000-0098-b93db4090000 pid=2484 /usr/bin/chmod guuid=4b5d3c8d-1a00-0000-0098-b93d95090000 pid=2453->guuid=9b6f119a-1a00-0000-0098-b93db4090000 pid=2484 execve guuid=8315759a-1a00-0000-0098-b93db5090000 pid=2485 /usr/bin/dash guuid=4b5d3c8d-1a00-0000-0098-b93d95090000 pid=2453->guuid=8315759a-1a00-0000-0098-b93db5090000 pid=2485 clone guuid=2889819a-1a00-0000-0098-b93db6090000 pid=2486 /usr/bin/wget net send-data write-file guuid=4b5d3c8d-1a00-0000-0098-b93d95090000 pid=2453->guuid=2889819a-1a00-0000-0098-b93db6090000 pid=2486 execve guuid=e470ef9f-1a00-0000-0098-b93dc3090000 pid=2499 /usr/bin/chmod guuid=4b5d3c8d-1a00-0000-0098-b93d95090000 pid=2453->guuid=e470ef9f-1a00-0000-0098-b93dc3090000 pid=2499 execve guuid=79c55ca0-1a00-0000-0098-b93dc5090000 pid=2501 /usr/bin/dash guuid=4b5d3c8d-1a00-0000-0098-b93d95090000 pid=2453->guuid=79c55ca0-1a00-0000-0098-b93dc5090000 pid=2501 clone guuid=53a47ca0-1a00-0000-0098-b93dc6090000 pid=2502 /usr/bin/wget net send-data write-file guuid=4b5d3c8d-1a00-0000-0098-b93d95090000 pid=2453->guuid=53a47ca0-1a00-0000-0098-b93dc6090000 pid=2502 execve guuid=d2730fa6-1a00-0000-0098-b93dd1090000 pid=2513 /usr/bin/chmod guuid=4b5d3c8d-1a00-0000-0098-b93d95090000 pid=2453->guuid=d2730fa6-1a00-0000-0098-b93dd1090000 pid=2513 execve guuid=cef65fa6-1a00-0000-0098-b93dd2090000 pid=2514 /usr/bin/dash guuid=4b5d3c8d-1a00-0000-0098-b93d95090000 pid=2453->guuid=cef65fa6-1a00-0000-0098-b93dd2090000 pid=2514 clone guuid=fac06ea6-1a00-0000-0098-b93dd3090000 pid=2515 /usr/bin/wget net send-data write-file guuid=4b5d3c8d-1a00-0000-0098-b93d95090000 pid=2453->guuid=fac06ea6-1a00-0000-0098-b93dd3090000 pid=2515 execve guuid=94ec10aa-1a00-0000-0098-b93ddb090000 pid=2523 /usr/bin/chmod guuid=4b5d3c8d-1a00-0000-0098-b93d95090000 pid=2453->guuid=94ec10aa-1a00-0000-0098-b93ddb090000 pid=2523 execve guuid=a0d74aaa-1a00-0000-0098-b93ddc090000 pid=2524 /usr/bin/dash guuid=4b5d3c8d-1a00-0000-0098-b93d95090000 pid=2453->guuid=a0d74aaa-1a00-0000-0098-b93ddc090000 pid=2524 clone guuid=30bd56aa-1a00-0000-0098-b93dde090000 pid=2526 /usr/bin/wget net send-data write-file guuid=4b5d3c8d-1a00-0000-0098-b93d95090000 pid=2453->guuid=30bd56aa-1a00-0000-0098-b93dde090000 pid=2526 execve guuid=b65114af-1a00-0000-0098-b93de9090000 pid=2537 /usr/bin/chmod guuid=4b5d3c8d-1a00-0000-0098-b93d95090000 pid=2453->guuid=b65114af-1a00-0000-0098-b93de9090000 pid=2537 execve guuid=ae9577af-1a00-0000-0098-b93deb090000 pid=2539 /usr/bin/dash guuid=4b5d3c8d-1a00-0000-0098-b93d95090000 pid=2453->guuid=ae9577af-1a00-0000-0098-b93deb090000 pid=2539 clone guuid=40df8aaf-1a00-0000-0098-b93dec090000 pid=2540 /usr/bin/wget net send-data write-file guuid=4b5d3c8d-1a00-0000-0098-b93d95090000 pid=2453->guuid=40df8aaf-1a00-0000-0098-b93dec090000 pid=2540 execve guuid=287b0ab5-1a00-0000-0098-b93dfa090000 pid=2554 /usr/bin/chmod guuid=4b5d3c8d-1a00-0000-0098-b93d95090000 pid=2453->guuid=287b0ab5-1a00-0000-0098-b93dfa090000 pid=2554 execve guuid=cfdf1cb6-1a00-0000-0098-b93dfc090000 pid=2556 /usr/bin/dash guuid=4b5d3c8d-1a00-0000-0098-b93d95090000 pid=2453->guuid=cfdf1cb6-1a00-0000-0098-b93dfc090000 pid=2556 clone guuid=25ac31b6-1a00-0000-0098-b93dfd090000 pid=2557 /usr/bin/wget net send-data write-file guuid=4b5d3c8d-1a00-0000-0098-b93d95090000 pid=2453->guuid=25ac31b6-1a00-0000-0098-b93dfd090000 pid=2557 execve guuid=5855bdbb-1a00-0000-0098-b93d060a0000 pid=2566 /usr/bin/chmod guuid=4b5d3c8d-1a00-0000-0098-b93d95090000 pid=2453->guuid=5855bdbb-1a00-0000-0098-b93d060a0000 pid=2566 execve guuid=e5f0fbbb-1a00-0000-0098-b93d080a0000 pid=2568 /usr/bin/dash guuid=4b5d3c8d-1a00-0000-0098-b93d95090000 pid=2453->guuid=e5f0fbbb-1a00-0000-0098-b93d080a0000 pid=2568 clone guuid=31990abc-1a00-0000-0098-b93d090a0000 pid=2569 /usr/bin/wget net send-data write-file guuid=4b5d3c8d-1a00-0000-0098-b93d95090000 pid=2453->guuid=31990abc-1a00-0000-0098-b93d090a0000 pid=2569 execve guuid=073b47c0-1a00-0000-0098-b93d130a0000 pid=2579 /usr/bin/chmod guuid=4b5d3c8d-1a00-0000-0098-b93d95090000 pid=2453->guuid=073b47c0-1a00-0000-0098-b93d130a0000 pid=2579 execve guuid=c3e6aac0-1a00-0000-0098-b93d150a0000 pid=2581 /usr/bin/dash guuid=4b5d3c8d-1a00-0000-0098-b93d95090000 pid=2453->guuid=c3e6aac0-1a00-0000-0098-b93d150a0000 pid=2581 clone guuid=b226b9c0-1a00-0000-0098-b93d160a0000 pid=2582 /usr/bin/wget net send-data write-file guuid=4b5d3c8d-1a00-0000-0098-b93d95090000 pid=2453->guuid=b226b9c0-1a00-0000-0098-b93d160a0000 pid=2582 execve guuid=5fae71c4-1a00-0000-0098-b93d240a0000 pid=2596 /usr/bin/chmod guuid=4b5d3c8d-1a00-0000-0098-b93d95090000 pid=2453->guuid=5fae71c4-1a00-0000-0098-b93d240a0000 pid=2596 execve guuid=fbb4b7c4-1a00-0000-0098-b93d260a0000 pid=2598 /usr/bin/dash guuid=4b5d3c8d-1a00-0000-0098-b93d95090000 pid=2453->guuid=fbb4b7c4-1a00-0000-0098-b93d260a0000 pid=2598 clone 30869a63-1c02-59d5-b327-e457809c9911 41.216.188.162:80 guuid=efc9928d-1a00-0000-0098-b93d97090000 pid=2455->30869a63-1c02-59d5-b327-e457809c9911 send: 143B guuid=b6d52096-1a00-0000-0098-b93da9090000 pid=2473->30869a63-1c02-59d5-b327-e457809c9911 send: 142B guuid=2889819a-1a00-0000-0098-b93db6090000 pid=2486->30869a63-1c02-59d5-b327-e457809c9911 send: 143B guuid=53a47ca0-1a00-0000-0098-b93dc6090000 pid=2502->30869a63-1c02-59d5-b327-e457809c9911 send: 143B guuid=fac06ea6-1a00-0000-0098-b93dd3090000 pid=2515->30869a63-1c02-59d5-b327-e457809c9911 send: 143B guuid=30bd56aa-1a00-0000-0098-b93dde090000 pid=2526->30869a63-1c02-59d5-b327-e457809c9911 send: 143B guuid=40df8aaf-1a00-0000-0098-b93dec090000 pid=2540->30869a63-1c02-59d5-b327-e457809c9911 send: 142B guuid=25ac31b6-1a00-0000-0098-b93dfd090000 pid=2557->30869a63-1c02-59d5-b327-e457809c9911 send: 142B guuid=31990abc-1a00-0000-0098-b93d090a0000 pid=2569->30869a63-1c02-59d5-b327-e457809c9911 send: 142B guuid=b226b9c0-1a00-0000-0098-b93d160a0000 pid=2582->30869a63-1c02-59d5-b327-e457809c9911 send: 142B
Verdict:
Malicious
Threat:
Trojan-Downloader.Shell.Agent
Threat name:
Script-Shell.Downloader.Heuristic
Status:
Malicious
First seen:
2026-01-13 16:00:46 UTC
File Type:
Text (Shell)
AV detection:
8 of 36 (22.22%)
Threat level:
  2/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Modifies registry class
Suspicious use of SetWindowsHookEx
Enumerates physical storage devices
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:MAL_Linux_IoT_MultiArch_BotnetLoader_Generic
Author:Anish Bogati
Description:Technique-based detection of IoT/Linux botnet loader shell scripts downloading binaries from numeric IPs, chmodding, and executing multi-architecture payloads
Reference:MalwareBazaar sample lilin.sh

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh 8b8aadf5236c1280e0fe9699cfe8e32833a67dcdf9bc908eeced1981ef3c0dab

(this sample)

  
Delivery method
Distributed via web download

Comments