MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 8b9ea0ab6d318a0bf0e90a2d12c9b2a23d3f242f1b081464e4721fbc12b1ec11. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 8


Intelligence 8 IOCs YARA File information Comments

SHA256 hash: 8b9ea0ab6d318a0bf0e90a2d12c9b2a23d3f242f1b081464e4721fbc12b1ec11
SHA3-384 hash: a619e222a13cdec6ea963cf265a581bc21c18215d879d6df8c27ad47c380dd5dc2a1c535164a5cccef711e081775fa10
SHA1 hash: 40afd90841f24bdc1cf501b470cda7a97ef9865c
MD5 hash: 2ffa916b30b0079ffa98b409ed096f08
humanhash: seventeen-william-jig-johnny
File name:ohshit.sh
Download: download sample
Signature Mirai
File size:2'479 bytes
First seen:2026-02-28 18:27:53 UTC
Last seen:2026-03-01 03:14:14 UTC
File type: sh
MIME type:text/x-shellscript
ssdeep 24:IthSFLYnSER2UFAL4n4o1cTfkNfiuL4eTpaOXgGZ4dvo:ihSFL4SEA6A2cTfkfiA4AaGZ4g
TLSH T1A55104CA13934371ACA1DE7BB2F50945B5B1A08B74C59D58A8EC38F492CCD4A7DC5AC3
TrID 70.0% (.SH) Linux/UNIX shell script (7000/1)
30.0% (.) Unix-like shebang (var.3) (gen) (3000/1)
Magika shell
Reporter abuse_ch
Tags:sh
URLMalware sample (SHA256 hash)SignatureTags
http://45.141.26.129//arcc406e9185645c7a40319fabc9b021021a9acffb2ec23253ec38f161be4fc1d20 Miraielf mirai ua-wget
http://45.141.26.129//x8625d1cfe16ffa3f9107b5aa906fa23123a0e3035747cf8a070f83a9597b05147e Miraielf mirai ua-wget
http://45.141.26.129//x86_6431af34400c260dbb02de00f976709cce410de17dbc66123cfb11f42f4a3beb08 Miraielf mirai ua-wget
http://45.141.26.129//i686a5d3b14ed9482a0c4947dcbcc206c40cee0ceddd0e80985a4be045eaf2fab7c6 Miraielf mirai ua-wget
http://45.141.26.129//mips54a790f11f64b2f4a0649f61acd006cefe63147c6d4c122bcbe732fa4c49e320 Miraielf mirai ua-wget
http://45.141.26.129//mips64n/an/aelf ua-wget
http://45.141.26.129//mpsle55e5a3a4e133e342404e45087abc9bc2220a17dc3e23ed30b940f0994d3fe00 Miraielf mirai ua-wget
http://45.141.26.129//armn/an/aelf ua-wget
http://45.141.26.129//arm5n/an/aelf ua-wget
http://45.141.26.129//arm6n/an/aelf ua-wget
http://45.141.26.129//arm7n/an/aelf ua-wget
http://45.141.26.129//ppc866d8cddd8d042426e7f9779ccf880cb1da36201adecb85d8ff674fa300cee89 Miraielf mirai ua-wget
http://45.141.26.129//sparcn/an/aelf ua-wget
http://45.141.26.129//m68k52817af1b60452736b419cfc629f3e2c493ca07b952093c0817be6f118dbabf1 Miraielf mirai ua-wget
http://45.141.26.129//sh4e1a2b8cba265c6141876894e32114362775f90b20d23419fdfb49dda52734cb6 Miraielf mirai ua-wget

Intelligence


File Origin
# of uploads :
2
# of downloads :
76
Origin country :
DE DE
Vendor Threat Intelligence
No detections
Result
Gathering data
Threat name:
Linux.Downloader.Medusa
Status:
Malicious
First seen:
2026-02-28 17:01:40 UTC
File Type:
Text (Shell)
AV detection:
20 of 36 (55.56%)
Threat level:
  3/5
Result
Malware family:
n/a
Score:
  9/10
Tags:
antivm defense_evasion discovery linux
Behaviour
Reads runtime system information
System Network Configuration Discovery
Writes file to tmp directory
Changes its process name
Checks CPU configuration
Reads system network configuration
Enumerates active TCP sockets
Enumerates running processes
File and Directory Permissions Modification
Executes dropped EXE
Modifies Watchdog functionality
Contacts a large (66818) amount of remote hosts
Creates a large amount of network flows
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh 8b9ea0ab6d318a0bf0e90a2d12c9b2a23d3f242f1b081464e4721fbc12b1ec11

(this sample)

  
Delivery method
Distributed via web download

Comments