MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 91316361fd9542e59daf8fb0825dd41f40793342d8ed8deede65bd761d280edb. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: 91316361fd9542e59daf8fb0825dd41f40793342d8ed8deede65bd761d280edb
SHA3-384 hash: c2ebf61267b31044de95805d4d091d5c260c57721cb8cb388c20a3c5cdf3564bc51536d25c01beaba6c08ed7f9c86f05
SHA1 hash: 4337f89da6e65464bf7ddf63d6de2c0e6c2bd960
MD5 hash: 55c0419e1745de8fac66cb2c3fc7bebd
humanhash: july-bluebird-california-mockingbird
File name:bins.sh
Download: download sample
Signature Mirai
File size:1'662 bytes
First seen:2026-04-24 23:56:15 UTC
Last seen:Never
File type: sh
MIME type:text/x-shellscript
ssdeep 48:XoMr9x17KR71R4R1Rq1eZ1FO1AU1AI10U1jv17w1wV171KDGuBYDaS8k6Ju1RE76:XL9x17W7jG1s1814171/1n1L181W17tP
TLSH T162312591F425F437F0569B75DB4BB320687234070558EB64F5CEA2A0BF9906C62B4B74
TrID 70.0% (.SH) Linux/UNIX shell script (7000/1)
30.0% (.) Unix-like shebang (var.3) (gen) (3000/1)
Magika shell
Reporter abuse_ch
Tags:mirai sh

Intelligence


File Origin
# of uploads :
1
# of downloads :
47
Origin country :
DE DE
Vendor Threat Intelligence
No detections
Gathering data
Verdict:
Malicious
File Type:
unix shell
First seen:
2026-04-24T21:04:00Z UTC
Last seen:
2026-04-26T13:04:00Z UTC
Hits:
~10
Status:
terminated
Behavior Graph:
%3 guuid=ff3edc9c-1900-0000-5acd-b4ac600b0000 pid=2912 /usr/bin/sudo guuid=6bf7fc9e-1900-0000-5acd-b4ac630b0000 pid=2915 /tmp/sample.bin write-config guuid=ff3edc9c-1900-0000-5acd-b4ac600b0000 pid=2912->guuid=6bf7fc9e-1900-0000-5acd-b4ac630b0000 pid=2915 execve guuid=f132779f-1900-0000-5acd-b4ac650b0000 pid=2917 /usr/bin/mktemp guuid=6bf7fc9e-1900-0000-5acd-b4ac630b0000 pid=2915->guuid=f132779f-1900-0000-5acd-b4ac650b0000 pid=2917 execve guuid=e561d19f-1900-0000-5acd-b4ac670b0000 pid=2919 /usr/bin/bash guuid=6bf7fc9e-1900-0000-5acd-b4ac630b0000 pid=2915->guuid=e561d19f-1900-0000-5acd-b4ac670b0000 pid=2919 clone guuid=e642a5a0-1900-0000-5acd-b4ac6b0b0000 pid=2923 /usr/bin/wget net send-data write-file guuid=6bf7fc9e-1900-0000-5acd-b4ac630b0000 pid=2915->guuid=e642a5a0-1900-0000-5acd-b4ac6b0b0000 pid=2923 execve guuid=be9815a6-1900-0000-5acd-b4ac730b0000 pid=2931 /usr/bin/chmod guuid=6bf7fc9e-1900-0000-5acd-b4ac630b0000 pid=2915->guuid=be9815a6-1900-0000-5acd-b4ac730b0000 pid=2931 execve guuid=b9a181a6-1900-0000-5acd-b4ac740b0000 pid=2932 /usr/bin/bash guuid=6bf7fc9e-1900-0000-5acd-b4ac630b0000 pid=2915->guuid=b9a181a6-1900-0000-5acd-b4ac740b0000 pid=2932 clone guuid=4ebca3a6-1900-0000-5acd-b4ac750b0000 pid=2933 /usr/bin/cp guuid=6bf7fc9e-1900-0000-5acd-b4ac630b0000 pid=2915->guuid=4ebca3a6-1900-0000-5acd-b4ac750b0000 pid=2933 execve guuid=51e43aa7-1900-0000-5acd-b4ac760b0000 pid=2934 /usr/bin/chmod guuid=6bf7fc9e-1900-0000-5acd-b4ac630b0000 pid=2915->guuid=51e43aa7-1900-0000-5acd-b4ac760b0000 pid=2934 execve guuid=c9c69fa7-1900-0000-5acd-b4ac770b0000 pid=2935 /usr/bin/cat write-config guuid=6bf7fc9e-1900-0000-5acd-b4ac630b0000 pid=2915->guuid=c9c69fa7-1900-0000-5acd-b4ac770b0000 pid=2935 execve guuid=ca241ba8-1900-0000-5acd-b4ac780b0000 pid=2936 /usr/bin/systemctl guuid=6bf7fc9e-1900-0000-5acd-b4ac630b0000 pid=2915->guuid=ca241ba8-1900-0000-5acd-b4ac780b0000 pid=2936 execve guuid=871149ef-1900-0000-5acd-b4aced0b0000 pid=3053 /usr/bin/systemctl guuid=6bf7fc9e-1900-0000-5acd-b4ac630b0000 pid=2915->guuid=871149ef-1900-0000-5acd-b4aced0b0000 pid=3053 execve guuid=c36645f2-1900-0000-5acd-b4acf60b0000 pid=3062 /usr/bin/bash guuid=6bf7fc9e-1900-0000-5acd-b4ac630b0000 pid=2915->guuid=c36645f2-1900-0000-5acd-b4acf60b0000 pid=3062 clone guuid=47164af2-1900-0000-5acd-b4acf70b0000 pid=3063 /usr/bin/bash guuid=6bf7fc9e-1900-0000-5acd-b4ac630b0000 pid=2915->guuid=47164af2-1900-0000-5acd-b4acf70b0000 pid=3063 clone guuid=f5987ef2-1900-0000-5acd-b4acfa0b0000 pid=3066 /usr/bin/chmod guuid=6bf7fc9e-1900-0000-5acd-b4ac630b0000 pid=2915->guuid=f5987ef2-1900-0000-5acd-b4acfa0b0000 pid=3066 execve guuid=e737b9f2-1900-0000-5acd-b4acfb0b0000 pid=3067 /usr/bin/bash guuid=6bf7fc9e-1900-0000-5acd-b4ac630b0000 pid=2915->guuid=e737b9f2-1900-0000-5acd-b4acfb0b0000 pid=3067 clone guuid=9e89ccf2-1900-0000-5acd-b4acfd0b0000 pid=3069 /usr/bin/rm delete-file guuid=6bf7fc9e-1900-0000-5acd-b4ac630b0000 pid=2915->guuid=9e89ccf2-1900-0000-5acd-b4acfd0b0000 pid=3069 execve guuid=c492e59f-1900-0000-5acd-b4ac680b0000 pid=2920 /usr/bin/bash guuid=e561d19f-1900-0000-5acd-b4ac670b0000 pid=2919->guuid=c492e59f-1900-0000-5acd-b4ac680b0000 pid=2920 clone guuid=020a01a0-1900-0000-5acd-b4ac690b0000 pid=2921 /usr/bin/uname guuid=c492e59f-1900-0000-5acd-b4ac680b0000 pid=2920->guuid=020a01a0-1900-0000-5acd-b4ac690b0000 pid=2921 execve 2518ac35-7c39-5ae3-902e-6b81291bcee9 176.65.139.59:80 guuid=e642a5a0-1900-0000-5acd-b4ac6b0b0000 pid=2923->2518ac35-7c39-5ae3-902e-6b81291bcee9 send: 152B guuid=68635cf2-1900-0000-5acd-b4acf90b0000 pid=3065 /usr/bin/bash guuid=c36645f2-1900-0000-5acd-b4acf60b0000 pid=3062->guuid=68635cf2-1900-0000-5acd-b4acf90b0000 pid=3065 clone guuid=a31ec0f2-1900-0000-5acd-b4acfc0b0000 pid=3068 /usr/bin/bash zombie guuid=e737b9f2-1900-0000-5acd-b4acfb0b0000 pid=3067->guuid=a31ec0f2-1900-0000-5acd-b4acfc0b0000 pid=3068 clone guuid=0bccd9f2-1900-0000-5acd-b4acfe0b0000 pid=3070 /usr/bin/mv guuid=a31ec0f2-1900-0000-5acd-b4acfc0b0000 pid=3068->guuid=0bccd9f2-1900-0000-5acd-b4acfe0b0000 pid=3070 execve guuid=d75353f3-1900-0000-5acd-b4ac020c0000 pid=3074 /usr/bin/.dbus mprotect-exec net guuid=a31ec0f2-1900-0000-5acd-b4acfc0b0000 pid=3068->guuid=d75353f3-1900-0000-5acd-b4ac020c0000 pid=3074 execve 8b0a01dc-0728-52c1-8024-c4ba7801b8d6 8.8.8.8:53 guuid=d75353f3-1900-0000-5acd-b4ac020c0000 pid=3074->8b0a01dc-0728-52c1-8024-c4ba7801b8d6 con guuid=d68790f3-1900-0000-5acd-b4ac040c0000 pid=3076 /usr/bin/.dbus guuid=d75353f3-1900-0000-5acd-b4ac020c0000 pid=3074->guuid=d68790f3-1900-0000-5acd-b4ac040c0000 pid=3076 clone guuid=d92993f3-1900-0000-5acd-b4ac060c0000 pid=3078 /usr/bin/.dbus zombie guuid=d75353f3-1900-0000-5acd-b4ac020c0000 pid=3074->guuid=d92993f3-1900-0000-5acd-b4ac060c0000 pid=3078 clone guuid=aacc95f3-1900-0000-5acd-b4ac070c0000 pid=3079 /usr/bin/.dbus net send-data zombie guuid=d75353f3-1900-0000-5acd-b4ac020c0000 pid=3074->guuid=aacc95f3-1900-0000-5acd-b4ac070c0000 pid=3079 clone guuid=aacc95f3-1900-0000-5acd-b4ac070c0000 pid=3079->8b0a01dc-0728-52c1-8024-c4ba7801b8d6 con 24d354c6-91ef-5414-a7cc-1da79435a43f 176.65.139.59:1337 guuid=aacc95f3-1900-0000-5acd-b4ac070c0000 pid=3079->24d354c6-91ef-5414-a7cc-1da79435a43f send: 7B
Threat name:
Linux.Trojan.Generic
Status:
Suspicious
First seen:
2026-04-24 23:56:43 UTC
File Type:
Text (Shell)
AV detection:
6 of 24 (25.00%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:mirai botnet:lzrd botnet defense_evasion discovery execution linux persistence privilege_escalation upx
Behaviour
Enumerates kernel/hardware configuration
Reads runtime system information
System Network Configuration Discovery
Writes file to tmp directory
UPX packed file
Creates/modifies Cron job
Enumerates running processes
Modifies rc script
Modifies systemd
Writes file to system bin folder
File and Directory Permissions Modification
Executes dropped EXE
Modifies Watchdog functionality
Family: Mirai
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh 91316361fd9542e59daf8fb0825dd41f40793342d8ed8deede65bd761d280edb

(this sample)

  
Delivery method
Distributed via web download

Comments