MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 915636d1dc7202f513ea34a2c7289b858dc32fc08dff058e6b515ae7b1ef5194. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 6


Intelligence 6 IOCs YARA 2 File information Comments

SHA256 hash: 915636d1dc7202f513ea34a2c7289b858dc32fc08dff058e6b515ae7b1ef5194
SHA3-384 hash: 8ce4656e75e36dc2f67a3debb7068b2c0ef9fa2146c6ae1abc38b93a67d52a4ecca39bdaf0f6f3a122c9090cc33b12b0
SHA1 hash: 41a03a5faa3cf0ea6d25ba8cc6d57e5bd314a64f
MD5 hash: 426b75ae74a594daff37d593aaad2aa5
humanhash: lima-north-hamper-burger
File name:bbl.sh
Download: download sample
Signature Mirai
File size:900 bytes
First seen:2025-12-30 18:56:13 UTC
Last seen:Never
File type: sh
MIME type:text/x-shellscript
ssdeep 24:2vDdhHdQNIXkgdyK/dhUUdhS4d8fgdtdwkAGzo:QPHX5k2zUUzS46onK
TLSH T10711A3CF70047A1CD80C6DC772AAD909A101F5ABDE930E18EC9C003EF48EE75B288558
TrID 70.0% (.SH) Linux/UNIX shell script (7000/1)
30.0% (.) Unix-like shebang (var.3) (gen) (3000/1)
Magika shell
Reporter abuse_ch
Tags:sh
URLMalware sample (SHA256 hash)SignatureTags
http://130.12.180.85/file/data.arm564216dc0b41b6ba5e46372388955917b02a387561492f378bb88a9eec76f2088 Miraiarm elf geofenced mirai ua-wget USA
http://130.12.180.85/file/data.arm656dc73a8df44f02493f00004bc8dbfc051962f3831a609ca3597a539a16ac57d Miraiarm elf geofenced mirai ua-wget USA
http://130.12.180.85/file/data.arm7f115b2376db343650c40db39cd0b7c353a967ff8584a7184399503bb2a3e4c23 Miraiarm elf geofenced mirai ua-wget USA
http://130.12.180.85/file/data.mipsn/an/aelf geofenced mips ua-wget USA
http://130.12.180.85/file/data.mipsel0fc5de3cdd82997b6c2b8d6dfc61d6af1c281a14b006a2f3cb8e3d5ffcef218d Miraielf geofenced mips mirai ua-wget USA
http://130.12.180.85/file/data.x86n/an/aelf geofenced ua-wget USA x86
http://130.12.180.85/file/data.x86_64ec189ea803d03f06c59f1cd2005a1e3dcbece343ca6ccbde8579e8ee815292e7 Miraielf geofenced ua-wget USA x86
http://130.12.180.85/file/data.aarch64edf0899d2f69e15ba4c38adc470b722d992f1766230b434873121be3b0af56a1 Miraiarm elf geofenced mirai ua-wget USA

Intelligence


File Origin
# of uploads :
1
# of downloads :
35
Origin country :
DE DE
Vendor Threat Intelligence
No detections
Result
Gathering data
Verdict:
Malicious
File Type:
Script
Detections:
HEUR:Trojan-Downloader.Shell.Agent.p HEUR:Trojan-Downloader.Shell.Agent.gen HEUR:Trojan-Downloader.Shell.Agent.a
Status:
terminated
Behavior Graph:
%3 guuid=ae1f9683-1800-0000-6b39-75c15a050000 pid=1370 /usr/bin/sudo guuid=6b43ca85-1800-0000-6b39-75c162050000 pid=1378 /tmp/sample.bin guuid=ae1f9683-1800-0000-6b39-75c15a050000 pid=1370->guuid=6b43ca85-1800-0000-6b39-75c162050000 pid=1378 execve guuid=44982086-1800-0000-6b39-75c164050000 pid=1380 /usr/bin/cp guuid=6b43ca85-1800-0000-6b39-75c162050000 pid=1378->guuid=44982086-1800-0000-6b39-75c164050000 pid=1380 execve guuid=9149958c-1800-0000-6b39-75c172050000 pid=1394 /usr/bin/wget net send-data write-file guuid=6b43ca85-1800-0000-6b39-75c162050000 pid=1378->guuid=9149958c-1800-0000-6b39-75c172050000 pid=1394 execve guuid=868b2b95-1800-0000-6b39-75c185050000 pid=1413 /usr/bin/chmod guuid=6b43ca85-1800-0000-6b39-75c162050000 pid=1378->guuid=868b2b95-1800-0000-6b39-75c185050000 pid=1413 execve guuid=81ff7e95-1800-0000-6b39-75c186050000 pid=1414 /usr/bin/bash guuid=6b43ca85-1800-0000-6b39-75c162050000 pid=1378->guuid=81ff7e95-1800-0000-6b39-75c186050000 pid=1414 clone guuid=8e0b3d96-1800-0000-6b39-75c189050000 pid=1417 /usr/bin/rm delete-file guuid=6b43ca85-1800-0000-6b39-75c162050000 pid=1378->guuid=8e0b3d96-1800-0000-6b39-75c189050000 pid=1417 execve guuid=a78b9a96-1800-0000-6b39-75c18a050000 pid=1418 /usr/bin/wget net send-data write-file guuid=6b43ca85-1800-0000-6b39-75c162050000 pid=1378->guuid=a78b9a96-1800-0000-6b39-75c18a050000 pid=1418 execve guuid=f299849e-1800-0000-6b39-75c19f050000 pid=1439 /usr/bin/chmod guuid=6b43ca85-1800-0000-6b39-75c162050000 pid=1378->guuid=f299849e-1800-0000-6b39-75c19f050000 pid=1439 execve guuid=48a7f29e-1800-0000-6b39-75c1a1050000 pid=1441 /usr/bin/bash guuid=6b43ca85-1800-0000-6b39-75c162050000 pid=1378->guuid=48a7f29e-1800-0000-6b39-75c1a1050000 pid=1441 clone guuid=58c6e99f-1800-0000-6b39-75c1a6050000 pid=1446 /usr/bin/rm delete-file guuid=6b43ca85-1800-0000-6b39-75c162050000 pid=1378->guuid=58c6e99f-1800-0000-6b39-75c1a6050000 pid=1446 execve guuid=a6e930a0-1800-0000-6b39-75c1a8050000 pid=1448 /usr/bin/wget net send-data write-file guuid=6b43ca85-1800-0000-6b39-75c162050000 pid=1378->guuid=a6e930a0-1800-0000-6b39-75c1a8050000 pid=1448 execve guuid=20d523a7-1800-0000-6b39-75c1be050000 pid=1470 /usr/bin/chmod guuid=6b43ca85-1800-0000-6b39-75c162050000 pid=1378->guuid=20d523a7-1800-0000-6b39-75c1be050000 pid=1470 execve guuid=4aee62a7-1800-0000-6b39-75c1bf050000 pid=1471 /usr/bin/bash guuid=6b43ca85-1800-0000-6b39-75c162050000 pid=1378->guuid=4aee62a7-1800-0000-6b39-75c1bf050000 pid=1471 clone guuid=fdbbdba7-1800-0000-6b39-75c1c3050000 pid=1475 /usr/bin/rm delete-file guuid=6b43ca85-1800-0000-6b39-75c162050000 pid=1378->guuid=fdbbdba7-1800-0000-6b39-75c1c3050000 pid=1475 execve guuid=74b220a8-1800-0000-6b39-75c1c5050000 pid=1477 /usr/bin/wget net send-data write-file guuid=6b43ca85-1800-0000-6b39-75c162050000 pid=1378->guuid=74b220a8-1800-0000-6b39-75c1c5050000 pid=1477 execve guuid=28562aaf-1800-0000-6b39-75c1d3050000 pid=1491 /usr/bin/chmod guuid=6b43ca85-1800-0000-6b39-75c162050000 pid=1378->guuid=28562aaf-1800-0000-6b39-75c1d3050000 pid=1491 execve guuid=8f7b77af-1800-0000-6b39-75c1d4050000 pid=1492 /usr/bin/bash guuid=6b43ca85-1800-0000-6b39-75c162050000 pid=1378->guuid=8f7b77af-1800-0000-6b39-75c1d4050000 pid=1492 clone guuid=e0295bb0-1800-0000-6b39-75c1d6050000 pid=1494 /usr/bin/rm delete-file guuid=6b43ca85-1800-0000-6b39-75c162050000 pid=1378->guuid=e0295bb0-1800-0000-6b39-75c1d6050000 pid=1494 execve guuid=5cacbcb0-1800-0000-6b39-75c1d7050000 pid=1495 /usr/bin/wget net send-data write-file guuid=6b43ca85-1800-0000-6b39-75c162050000 pid=1378->guuid=5cacbcb0-1800-0000-6b39-75c1d7050000 pid=1495 execve guuid=eb2d10bb-1800-0000-6b39-75c1f8050000 pid=1528 /usr/bin/chmod guuid=6b43ca85-1800-0000-6b39-75c162050000 pid=1378->guuid=eb2d10bb-1800-0000-6b39-75c1f8050000 pid=1528 execve guuid=75377bbb-1800-0000-6b39-75c1fa050000 pid=1530 /usr/bin/bash guuid=6b43ca85-1800-0000-6b39-75c162050000 pid=1378->guuid=75377bbb-1800-0000-6b39-75c1fa050000 pid=1530 clone guuid=22c730bc-1800-0000-6b39-75c1fe050000 pid=1534 /usr/bin/rm delete-file guuid=6b43ca85-1800-0000-6b39-75c162050000 pid=1378->guuid=22c730bc-1800-0000-6b39-75c1fe050000 pid=1534 execve guuid=7c5283bc-1800-0000-6b39-75c100060000 pid=1536 /usr/bin/wget net send-data write-file guuid=6b43ca85-1800-0000-6b39-75c162050000 pid=1378->guuid=7c5283bc-1800-0000-6b39-75c100060000 pid=1536 execve guuid=c0deb4c4-1800-0000-6b39-75c118060000 pid=1560 /usr/bin/chmod guuid=6b43ca85-1800-0000-6b39-75c162050000 pid=1378->guuid=c0deb4c4-1800-0000-6b39-75c118060000 pid=1560 execve guuid=192c00c5-1800-0000-6b39-75c11a060000 pid=1562 /tmp/data.x86 net guuid=6b43ca85-1800-0000-6b39-75c162050000 pid=1378->guuid=192c00c5-1800-0000-6b39-75c11a060000 pid=1562 execve guuid=494c4fc5-1800-0000-6b39-75c11d060000 pid=1565 /usr/bin/rm delete-file guuid=6b43ca85-1800-0000-6b39-75c162050000 pid=1378->guuid=494c4fc5-1800-0000-6b39-75c11d060000 pid=1565 execve guuid=9a30c3c5-1800-0000-6b39-75c120060000 pid=1568 /usr/bin/wget net send-data write-file guuid=6b43ca85-1800-0000-6b39-75c162050000 pid=1378->guuid=9a30c3c5-1800-0000-6b39-75c120060000 pid=1568 execve guuid=b8b48bce-1800-0000-6b39-75c13b060000 pid=1595 /usr/bin/chmod guuid=6b43ca85-1800-0000-6b39-75c162050000 pid=1378->guuid=b8b48bce-1800-0000-6b39-75c13b060000 pid=1595 execve guuid=8742dfce-1800-0000-6b39-75c13d060000 pid=1597 /tmp/data.x86_64 net guuid=6b43ca85-1800-0000-6b39-75c162050000 pid=1378->guuid=8742dfce-1800-0000-6b39-75c13d060000 pid=1597 execve guuid=03f234f9-1900-0000-6b39-75c1de080000 pid=2270 /usr/bin/rm guuid=6b43ca85-1800-0000-6b39-75c162050000 pid=1378->guuid=03f234f9-1900-0000-6b39-75c1de080000 pid=2270 execve guuid=67a893f9-1900-0000-6b39-75c1e0080000 pid=2272 /usr/bin/wget net send-data write-file guuid=6b43ca85-1800-0000-6b39-75c162050000 pid=1378->guuid=67a893f9-1900-0000-6b39-75c1e0080000 pid=2272 execve guuid=0d464b02-1a00-0000-6b39-75c1fa080000 pid=2298 /usr/bin/chmod guuid=6b43ca85-1800-0000-6b39-75c162050000 pid=1378->guuid=0d464b02-1a00-0000-6b39-75c1fa080000 pid=2298 execve guuid=32c69602-1a00-0000-6b39-75c1fc080000 pid=2300 /usr/bin/bash guuid=6b43ca85-1800-0000-6b39-75c162050000 pid=1378->guuid=32c69602-1a00-0000-6b39-75c1fc080000 pid=2300 clone guuid=e0ca2f03-1a00-0000-6b39-75c100090000 pid=2304 /usr/bin/rm delete-file guuid=6b43ca85-1800-0000-6b39-75c162050000 pid=1378->guuid=e0ca2f03-1a00-0000-6b39-75c100090000 pid=2304 execve guuid=125b9303-1a00-0000-6b39-75c103090000 pid=2307 /usr/bin/rm guuid=6b43ca85-1800-0000-6b39-75c162050000 pid=1378->guuid=125b9303-1a00-0000-6b39-75c103090000 pid=2307 execve 465b7190-3501-545b-b6aa-fbcf9cff6a23 130.12.180.85:80 guuid=9149958c-1800-0000-6b39-75c172050000 pid=1394->465b7190-3501-545b-b6aa-fbcf9cff6a23 send: 142B guuid=a78b9a96-1800-0000-6b39-75c18a050000 pid=1418->465b7190-3501-545b-b6aa-fbcf9cff6a23 send: 142B guuid=a6e930a0-1800-0000-6b39-75c1a8050000 pid=1448->465b7190-3501-545b-b6aa-fbcf9cff6a23 send: 142B guuid=74b220a8-1800-0000-6b39-75c1c5050000 pid=1477->465b7190-3501-545b-b6aa-fbcf9cff6a23 send: 142B guuid=5cacbcb0-1800-0000-6b39-75c1d7050000 pid=1495->465b7190-3501-545b-b6aa-fbcf9cff6a23 send: 144B guuid=7c5283bc-1800-0000-6b39-75c100060000 pid=1536->465b7190-3501-545b-b6aa-fbcf9cff6a23 send: 141B 8b0a01dc-0728-52c1-8024-c4ba7801b8d6 8.8.8.8:53 guuid=192c00c5-1800-0000-6b39-75c11a060000 pid=1562->8b0a01dc-0728-52c1-8024-c4ba7801b8d6 con guuid=5ac743c5-1800-0000-6b39-75c11c060000 pid=1564 /tmp/data.x86 delete-file dns net send-data zombie guuid=192c00c5-1800-0000-6b39-75c11a060000 pid=1562->guuid=5ac743c5-1800-0000-6b39-75c11c060000 pid=1564 clone guuid=5ac743c5-1800-0000-6b39-75c11c060000 pid=1564->8b0a01dc-0728-52c1-8024-c4ba7801b8d6 send: 45B 7811855c-2484-5fd4-830e-19c574d425b4 readthisifgay.datasurge.vip:6767 guuid=5ac743c5-1800-0000-6b39-75c11c060000 pid=1564->7811855c-2484-5fd4-830e-19c574d425b4 con guuid=d5277b3e-1900-0000-6b39-75c142070000 pid=1858 /tmp/data.x86 guuid=5ac743c5-1800-0000-6b39-75c11c060000 pid=1564->guuid=d5277b3e-1900-0000-6b39-75c142070000 pid=1858 clone guuid=35aa293f-1900-0000-6b39-75c143070000 pid=1859 /usr/bin/dash guuid=5ac743c5-1800-0000-6b39-75c11c060000 pid=1564->guuid=35aa293f-1900-0000-6b39-75c143070000 pid=1859 execve guuid=30ea284e-1900-0000-6b39-75c162070000 pid=1890 /usr/bin/dash guuid=5ac743c5-1800-0000-6b39-75c11c060000 pid=1564->guuid=30ea284e-1900-0000-6b39-75c162070000 pid=1890 execve guuid=9ffda34e-1900-0000-6b39-75c165070000 pid=1893 /usr/bin/dash guuid=5ac743c5-1800-0000-6b39-75c11c060000 pid=1564->guuid=9ffda34e-1900-0000-6b39-75c165070000 pid=1893 execve guuid=efb08750-1900-0000-6b39-75c16a070000 pid=1898 /usr/bin/dash guuid=5ac743c5-1800-0000-6b39-75c11c060000 pid=1564->guuid=efb08750-1900-0000-6b39-75c16a070000 pid=1898 execve guuid=46b97952-1900-0000-6b39-75c172070000 pid=1906 /usr/bin/dash guuid=5ac743c5-1800-0000-6b39-75c11c060000 pid=1564->guuid=46b97952-1900-0000-6b39-75c172070000 pid=1906 execve guuid=a314e953-1900-0000-6b39-75c177070000 pid=1911 /usr/bin/dash guuid=5ac743c5-1800-0000-6b39-75c11c060000 pid=1564->guuid=a314e953-1900-0000-6b39-75c177070000 pid=1911 execve guuid=9a30c3c5-1800-0000-6b39-75c120060000 pid=1568->465b7190-3501-545b-b6aa-fbcf9cff6a23 send: 144B guuid=8742dfce-1800-0000-6b39-75c13d060000 pid=1597->8b0a01dc-0728-52c1-8024-c4ba7801b8d6 con f5e517f9-1e40-5982-ba6a-17580ff460fc 0.0.0.0:48132 guuid=8742dfce-1800-0000-6b39-75c13d060000 pid=1597->f5e517f9-1e40-5982-ba6a-17580ff460fc con guuid=098a23f9-1900-0000-6b39-75c1dd080000 pid=2269 /tmp/data.x86_64 dns net send-data zombie guuid=8742dfce-1800-0000-6b39-75c13d060000 pid=1597->guuid=098a23f9-1900-0000-6b39-75c1dd080000 pid=2269 clone guuid=f1985e3f-1900-0000-6b39-75c145070000 pid=1861 /usr/sbin/xtables-nft-multi guuid=35aa293f-1900-0000-6b39-75c143070000 pid=1859->guuid=f1985e3f-1900-0000-6b39-75c145070000 pid=1861 execve guuid=8ef1534e-1900-0000-6b39-75c164070000 pid=1892 /usr/sbin/xtables-nft-multi guuid=30ea284e-1900-0000-6b39-75c162070000 pid=1890->guuid=8ef1534e-1900-0000-6b39-75c164070000 pid=1892 execve guuid=de53d74e-1900-0000-6b39-75c167070000 pid=1895 /usr/sbin/xtables-nft-multi guuid=9ffda34e-1900-0000-6b39-75c165070000 pid=1893->guuid=de53d74e-1900-0000-6b39-75c167070000 pid=1895 execve guuid=64f1b750-1900-0000-6b39-75c16c070000 pid=1900 /usr/sbin/xtables-nft-multi guuid=efb08750-1900-0000-6b39-75c16a070000 pid=1898->guuid=64f1b750-1900-0000-6b39-75c16c070000 pid=1900 execve guuid=40f0ae52-1900-0000-6b39-75c173070000 pid=1907 /usr/sbin/xtables-nft-multi guuid=46b97952-1900-0000-6b39-75c172070000 pid=1906->guuid=40f0ae52-1900-0000-6b39-75c173070000 pid=1907 execve guuid=0d285254-1900-0000-6b39-75c179070000 pid=1913 /usr/bin/rm delete-file guuid=a314e953-1900-0000-6b39-75c177070000 pid=1911->guuid=0d285254-1900-0000-6b39-75c179070000 pid=1913 execve guuid=098a23f9-1900-0000-6b39-75c1dd080000 pid=2269->8b0a01dc-0728-52c1-8024-c4ba7801b8d6 send: 225B guuid=098a23f9-1900-0000-6b39-75c1dd080000 pid=2269->7811855c-2484-5fd4-830e-19c574d425b4 send: 4B guuid=f5719f71-1a00-0000-6b39-75c1ab090000 pid=2475 /tmp/data.x86_64 guuid=098a23f9-1900-0000-6b39-75c1dd080000 pid=2269->guuid=f5719f71-1a00-0000-6b39-75c1ab090000 pid=2475 clone guuid=67a893f9-1900-0000-6b39-75c1e0080000 pid=2272->465b7190-3501-545b-b6aa-fbcf9cff6a23 send: 145B
Threat name:
Linux.Downloader.Medusa
Status:
Malicious
First seen:
2025-12-30 18:57:14 UTC
File Type:
Text (Shell)
AV detection:
19 of 36 (52.78%)
Threat level:
  3/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
defense_evasion discovery linux
Behaviour
Reads runtime system information
System Network Configuration Discovery
Writes file to tmp directory
Changes its process name
Reads system network configuration
Deletes log files
Enumerates running processes
Writes file to system bin folder
File and Directory Permissions Modification
Executes dropped EXE
Flushes firewall rules
Modifies Watchdog functionality
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:ach_202412_suspect_bash_script
Author:abuse.ch
Description:Detects suspicious Linux bash scripts
Rule name:MAL_Linux_IoT_MultiArch_BotnetLoader_Generic
Author:Anish Bogati
Description:Technique-based detection of IoT/Linux botnet loader shell scripts downloading binaries from numeric IPs, chmodding, and executing multi-architecture payloads
Reference:MalwareBazaar sample lilin.sh

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh 915636d1dc7202f513ea34a2c7289b858dc32fc08dff058e6b515ae7b1ef5194

(this sample)

  
Delivery method
Distributed via web download

Comments