MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 913ff4bef54a41df8b00245bc556baea9a41ee32a386cdd0e34470641bb69f6f. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: 913ff4bef54a41df8b00245bc556baea9a41ee32a386cdd0e34470641bb69f6f
SHA3-384 hash: d32e102b577fcb22947cb11801d5c030dd4b95cf296b5148fdfa650c20afb012340377037e511bd9202f05dbf345d7fd
SHA1 hash: ae73b4a745cc344d1492f66ee123e007a2c26632
MD5 hash: 375f87e87ee8abc16915fac5c8bf4655
humanhash: sierra-earth-enemy-video
File name:i.sh
Download: download sample
Signature Mirai
File size:384 bytes
First seen:2025-09-12 05:29:40 UTC
Last seen:Never
File type: sh
MIME type:text/plain
ssdeep 6:J9+d9Fvf1FIHWK3FP0D1FLYqhD1F5WhI2qD1FD9KD1FP8o:J9+zFfZK3KbLYybYehbD9KbD
TLSH T1D1E0E5AA714A036E0B0CCF0932B05762D999C618C17007CBF80010798EF1544F8E1FAE
Magika shell
Reporter abuse_ch
Tags:sh
URLMalware sample (SHA256 hash)SignatureTags
http://42.112.26.45/m/moobs6c29cf7cac95941b444a34f7b60800c3a574f3238174d7581c5d21cafe00921e Gafgytelf gafgyt mirai ua-wget
http://42.112.26.45/m/mpsl6a731d8ed31ee578f3cd6359cf61f1f115284166b35d99cde278241cbba03f37 Gafgytelf gafgyt mirai ua-wget
http://42.112.26.45/m/arm49de39844a54290ce41ca8a4bc2bc29ca0904f04fdbc499fd167a9ab586ee8f9c Miraielf mirai ua-wget
http://42.112.26.45/m/arm5255fbd59b1ec6bc04c211ec2a463e8a085cadae617cc3e8c5ec6c042ea0a2daf Miraielf mirai ua-wget
http://42.112.26.45/m/arm7ba590857bab1a0236965690c8f3ff4278e44cde6291259d466d1d9dc53320015 Miraielf mirai ua-wget

Intelligence


File Origin
# of uploads :
1
# of downloads :
44
Origin country :
DE DE
Vendor Threat Intelligence
Status:
terminated
Behavior Graph:
%3 guuid=b09bfc6a-1e00-0000-4c31-ff8868090000 pid=2408 /usr/bin/sudo guuid=a11ac76c-1e00-0000-4c31-ff8870090000 pid=2416 /tmp/sample.bin guuid=b09bfc6a-1e00-0000-4c31-ff8868090000 pid=2408->guuid=a11ac76c-1e00-0000-4c31-ff8870090000 pid=2416 execve guuid=a6c1216d-1e00-0000-4c31-ff8872090000 pid=2418 /usr/bin/rm guuid=a11ac76c-1e00-0000-4c31-ff8870090000 pid=2416->guuid=a6c1216d-1e00-0000-4c31-ff8872090000 pid=2418 execve guuid=5414646d-1e00-0000-4c31-ff8873090000 pid=2419 /usr/bin/wget net send-data write-file guuid=a11ac76c-1e00-0000-4c31-ff8870090000 pid=2416->guuid=5414646d-1e00-0000-4c31-ff8873090000 pid=2419 execve guuid=ef9fe7a2-1e00-0000-4c31-ff88fd090000 pid=2557 /usr/bin/chmod guuid=a11ac76c-1e00-0000-4c31-ff8870090000 pid=2416->guuid=ef9fe7a2-1e00-0000-4c31-ff88fd090000 pid=2557 execve guuid=444240a3-1e00-0000-4c31-ff88ff090000 pid=2559 /usr/bin/dash guuid=a11ac76c-1e00-0000-4c31-ff8870090000 pid=2416->guuid=444240a3-1e00-0000-4c31-ff88ff090000 pid=2559 clone guuid=9438f8a3-1e00-0000-4c31-ff88030a0000 pid=2563 /usr/bin/wget net send-data write-file guuid=a11ac76c-1e00-0000-4c31-ff8870090000 pid=2416->guuid=9438f8a3-1e00-0000-4c31-ff88030a0000 pid=2563 execve guuid=fd8e93e5-1e00-0000-4c31-ff88b40a0000 pid=2740 /usr/bin/chmod guuid=a11ac76c-1e00-0000-4c31-ff8870090000 pid=2416->guuid=fd8e93e5-1e00-0000-4c31-ff88b40a0000 pid=2740 execve guuid=fd60ebe5-1e00-0000-4c31-ff88b50a0000 pid=2741 /usr/bin/dash guuid=a11ac76c-1e00-0000-4c31-ff8870090000 pid=2416->guuid=fd60ebe5-1e00-0000-4c31-ff88b50a0000 pid=2741 clone guuid=f42d3ae7-1e00-0000-4c31-ff88b90a0000 pid=2745 /usr/bin/wget net send-data write-file guuid=a11ac76c-1e00-0000-4c31-ff8870090000 pid=2416->guuid=f42d3ae7-1e00-0000-4c31-ff88b90a0000 pid=2745 execve guuid=57c00f1b-1f00-0000-4c31-ff88120b0000 pid=2834 /usr/bin/chmod guuid=a11ac76c-1e00-0000-4c31-ff8870090000 pid=2416->guuid=57c00f1b-1f00-0000-4c31-ff88120b0000 pid=2834 execve guuid=0cd16a1b-1f00-0000-4c31-ff88130b0000 pid=2835 /usr/bin/dash guuid=a11ac76c-1e00-0000-4c31-ff8870090000 pid=2416->guuid=0cd16a1b-1f00-0000-4c31-ff88130b0000 pid=2835 clone guuid=f17df41b-1f00-0000-4c31-ff88150b0000 pid=2837 /usr/bin/wget net send-data write-file guuid=a11ac76c-1e00-0000-4c31-ff8870090000 pid=2416->guuid=f17df41b-1f00-0000-4c31-ff88150b0000 pid=2837 execve guuid=38c64e53-1f00-0000-4c31-ff88800b0000 pid=2944 /usr/bin/chmod guuid=a11ac76c-1e00-0000-4c31-ff8870090000 pid=2416->guuid=38c64e53-1f00-0000-4c31-ff88800b0000 pid=2944 execve guuid=b538a753-1f00-0000-4c31-ff88810b0000 pid=2945 /usr/bin/dash guuid=a11ac76c-1e00-0000-4c31-ff8870090000 pid=2416->guuid=b538a753-1f00-0000-4c31-ff88810b0000 pid=2945 clone guuid=4089d754-1f00-0000-4c31-ff88840b0000 pid=2948 /usr/bin/wget net send-data write-file guuid=a11ac76c-1e00-0000-4c31-ff8870090000 pid=2416->guuid=4089d754-1f00-0000-4c31-ff88840b0000 pid=2948 execve guuid=de60d58b-1f00-0000-4c31-ff88f70b0000 pid=3063 /usr/bin/chmod guuid=a11ac76c-1e00-0000-4c31-ff8870090000 pid=2416->guuid=de60d58b-1f00-0000-4c31-ff88f70b0000 pid=3063 execve guuid=62ed5c8c-1f00-0000-4c31-ff88f90b0000 pid=3065 /usr/bin/dash guuid=a11ac76c-1e00-0000-4c31-ff8870090000 pid=2416->guuid=62ed5c8c-1f00-0000-4c31-ff88f90b0000 pid=3065 clone guuid=3317878d-1f00-0000-4c31-ff88fe0b0000 pid=3070 /usr/bin/rm delete-file guuid=a11ac76c-1e00-0000-4c31-ff8870090000 pid=2416->guuid=3317878d-1f00-0000-4c31-ff88fe0b0000 pid=3070 execve 7e1f030a-193f-5ef8-b58f-206d09d04b13 42.112.26.45:80 guuid=5414646d-1e00-0000-4c31-ff8873090000 pid=2419->7e1f030a-193f-5ef8-b58f-206d09d04b13 send: 134B guuid=9438f8a3-1e00-0000-4c31-ff88030a0000 pid=2563->7e1f030a-193f-5ef8-b58f-206d09d04b13 send: 133B guuid=f42d3ae7-1e00-0000-4c31-ff88b90a0000 pid=2745->7e1f030a-193f-5ef8-b58f-206d09d04b13 send: 133B guuid=f17df41b-1f00-0000-4c31-ff88150b0000 pid=2837->7e1f030a-193f-5ef8-b58f-206d09d04b13 send: 133B guuid=4089d754-1f00-0000-4c31-ff88840b0000 pid=2948->7e1f030a-193f-5ef8-b58f-206d09d04b13 send: 133B
Threat name:
Script-BAT.Trojan.Heuristic
Status:
Malicious
First seen:
2025-09-12 05:31:01 UTC
File Type:
Text (Shell)
AV detection:
3 of 23 (13.04%)
Threat level:
  2/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Modifies registry class
Suspicious use of SetWindowsHookEx
Enumerates physical storage devices
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh 913ff4bef54a41df8b00245bc556baea9a41ee32a386cdd0e34470641bb69f6f

(this sample)

  
Delivery method
Distributed via web download

Comments