MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 8dbbbcb6bec05f619f39a4bd5715e5f7270c29afbacad1fe831b6d3a8e7b7aa8. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 8


Intelligence 8 IOCs YARA File information Comments

SHA256 hash: 8dbbbcb6bec05f619f39a4bd5715e5f7270c29afbacad1fe831b6d3a8e7b7aa8
SHA3-384 hash: 1ac26420f852082fbdf14105936edebd7655ffdb2451d994ca16b83d6b10e92e1a212974a7a751cdd269afbfe5d84edc
SHA1 hash: 8343c9bada9fccfac51ba280c461b983ce46a1c7
MD5 hash: 27557d1b08989e7a6e1845d9592aadee
humanhash: london-violet-west-uranus
File name:auto
Download: download sample
Signature Mirai
File size:409 bytes
First seen:2026-02-26 04:47:24 UTC
Last seen:Never
File type: sh
MIME type:text/x-shellscript
ssdeep 6:Ygv9CJJ96GesqslN6lfhslNG6uNOCY9dRLGesqsLKFYlfhsLKFM6uNOwvn:YO92J9tLq1hYHCY9dYLq/F8h/FdHan
TLSH T17CE092E820354FD3534D0AAB216508ED132A3520AFEE0D66D1C07EBE902A8B87D8F302
TrID 70.0% (.SH) Linux/UNIX shell script (7000/1)
30.0% (.) Unix-like shebang (var.3) (gen) (3000/1)
Magika shell
Reporter abuse_ch
Tags:sh
URLMalware sample (SHA256 hash)SignatureTags
http://64.120.95.129/check1.sh0bdd42672c0f44295c963ef75642ff6fa95bbada4d9eb3c08a29d1aac4eb7caa Miraish ua-wget
http://64.120.95.129/check.sh942fcee6e6ee3ac530608079fbaa88c9e654cea683386e45323f3db695714385 Miraish ua-wget

Intelligence


File Origin
# of uploads :
1
# of downloads :
125
Origin country :
DE DE
Vendor Threat Intelligence
No detections
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
bash lolbin
Result
Gathering data
Result
Malware family:
xmrig_linux
Score:
  10/10
Tags:
family:xmrig family:xmrig_linux antivm defense_evasion discovery execution linux miner persistence privilege_escalation
Behaviour
Command and Scripting Interpreter: Unix Shell
Enumerates kernel/hardware configuration
Reads runtime system information
Writes file to tmp directory
Checks CPU configuration
Reads CPU attributes
Checks hardware identifiers (DMI)
Creates/modifies Cron job
Deletes log files
Enumerates running processes
Reads hardware information
File and Directory Permissions Modification
Indicator Removal: Clear Command History
Executes dropped EXE
XMRig Miner payload
Xmrig family
Xmrig_linux family
xmrig
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh 8dbbbcb6bec05f619f39a4bd5715e5f7270c29afbacad1fe831b6d3a8e7b7aa8

(this sample)

  
Delivery method
Distributed via web download

Comments