MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 96d9954c9085811cfeee16319eaf4458b45a36ac2a07e3a9a18f347e1759a6ff. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 7


Intelligence 7 IOCs YARA 1 File information Comments

SHA256 hash: 96d9954c9085811cfeee16319eaf4458b45a36ac2a07e3a9a18f347e1759a6ff
SHA3-384 hash: 10ae99e990713dc43f26db41690c4722adfe9ddaf9fdf77c257e329f29f5290176e7f2a4492b584811b4d20b969372ed
SHA1 hash: 39a2fa5c886594eca1ef10b213264d70be9e2202
MD5 hash: 94f655a573aae960b0b8c972a5ca2614
humanhash: california-bravo-beer-kitten
File name:f
Download: download sample
Signature Mirai
File size:1'395 bytes
First seen:2025-06-18 11:56:55 UTC
Last seen:2025-06-18 23:18:11 UTC
File type: sh
MIME type:text/plain
ssdeep 24:k9M5zLt+MB08xJxDkgSxnkxnmkgSx3xJkgSxSx0kgSx4zx4dkgCxjZ4xokgSxDxe:kS5XEA0gzDkgOomkgOhJkgOO0kgOUCkl
TLSH T12C212DCF40A8CD62AC405EDD36D30A1564C68AD956CF8BCBE48E01B9A1CCA0D7591F6A
Magika shell
Reporter abuse_ch
Tags:mirai sh
URLMalware sample (SHA256 hash)SignatureTags
http://94.26.90.217/vv/armv4la82594f321a14d22c63b44b8b3f4e5dcb725aeda14db201cfe59d6b37cb8093f Miraielf gafgyt mirai ua-wget
http://94.26.90.217/vv/armv5ld64ce359bc97c9643e66057dbd0ea9ed69d5272487e873119dc7a01134f852bc Miraielf gafgyt mirai ua-wget
http://94.26.90.217/vv/armv6l176858d674f19ed1c385ebfd952caea9f6a76f4b44828d6b8f21985476a35df0 Miraielf gafgyt mirai ua-wget
http://94.26.90.217/vv/armv7lae5dbccdfcd0e48e2065b462be5879d1c103e3dc9c553ce8eb319c6385580d78 Miraielf gafgyt mirai ua-wget
http://94.26.90.217/vv/armv4eb943667119371cf93171f54be0cfe586c747fd2e24745235b8b94e5dc112ba3b2 Miraielf gafgyt mirai ua-wget
http://94.26.90.217/vv/mipsc9e4443effd31a916b1a5f2b44c2ed541edccd396e74e91df965d11bdd1e4c90 Miraielf gafgyt mirai ua-wget
http://94.26.90.217/vv/mipsel520a8d6ba4d9f083361e3c4758e0edb59a865e772571b91500a511a13fb9295b Miraielf gafgyt mirai ua-wget

Intelligence


File Origin
# of uploads :
3
# of downloads :
71
Origin country :
DE DE
Vendor Threat Intelligence
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
busybox evasive
Status:
terminated
Behavior Graph:
%3 guuid=b31af5ae-1600-0000-d48a-4c39510c0000 pid=3153 /usr/bin/sudo guuid=727290b1-1600-0000-d48a-4c39590c0000 pid=3161 /tmp/sample.bin guuid=b31af5ae-1600-0000-d48a-4c39510c0000 pid=3153->guuid=727290b1-1600-0000-d48a-4c39590c0000 pid=3161 execve guuid=6139ffb1-1600-0000-d48a-4c395c0c0000 pid=3164 /usr/bin/dash guuid=727290b1-1600-0000-d48a-4c39590c0000 pid=3161->guuid=6139ffb1-1600-0000-d48a-4c395c0c0000 pid=3164 clone guuid=ac7071b3-1600-0000-d48a-4c39620c0000 pid=3170 /usr/bin/rm delete-file guuid=727290b1-1600-0000-d48a-4c39590c0000 pid=3161->guuid=ac7071b3-1600-0000-d48a-4c39620c0000 pid=3170 execve guuid=99bcc2b3-1600-0000-d48a-4c39630c0000 pid=3171 /usr/bin/rm delete-file guuid=727290b1-1600-0000-d48a-4c39590c0000 pid=3161->guuid=99bcc2b3-1600-0000-d48a-4c39630c0000 pid=3171 execve guuid=efab16b4-1600-0000-d48a-4c39640c0000 pid=3172 /usr/bin/rm delete-file guuid=727290b1-1600-0000-d48a-4c39590c0000 pid=3161->guuid=efab16b4-1600-0000-d48a-4c39640c0000 pid=3172 execve guuid=fbcb67b4-1600-0000-d48a-4c39650c0000 pid=3173 /usr/bin/rm guuid=727290b1-1600-0000-d48a-4c39590c0000 pid=3161->guuid=fbcb67b4-1600-0000-d48a-4c39650c0000 pid=3173 execve guuid=35d3b2b4-1600-0000-d48a-4c39660c0000 pid=3174 /usr/bin/dash guuid=727290b1-1600-0000-d48a-4c39590c0000 pid=3161->guuid=35d3b2b4-1600-0000-d48a-4c39660c0000 pid=3174 clone guuid=725cdeb5-1600-0000-d48a-4c39680c0000 pid=3176 /usr/bin/dash guuid=727290b1-1600-0000-d48a-4c39590c0000 pid=3161->guuid=725cdeb5-1600-0000-d48a-4c39680c0000 pid=3176 clone guuid=41af30b6-1600-0000-d48a-4c396a0c0000 pid=3178 /usr/bin/dash guuid=727290b1-1600-0000-d48a-4c39590c0000 pid=3161->guuid=41af30b6-1600-0000-d48a-4c396a0c0000 pid=3178 clone guuid=8e28ab0c-1700-0000-d48a-4c39b20c0000 pid=3250 /usr/bin/chmod guuid=727290b1-1600-0000-d48a-4c39590c0000 pid=3161->guuid=8e28ab0c-1700-0000-d48a-4c39b20c0000 pid=3250 execve guuid=7f9b610d-1700-0000-d48a-4c39b40c0000 pid=3252 /usr/bin/dash guuid=727290b1-1600-0000-d48a-4c39590c0000 pid=3161->guuid=7f9b610d-1700-0000-d48a-4c39b40c0000 pid=3252 clone guuid=2aedf40e-1700-0000-d48a-4c39b80c0000 pid=3256 /usr/bin/dash guuid=727290b1-1600-0000-d48a-4c39590c0000 pid=3161->guuid=2aedf40e-1700-0000-d48a-4c39b80c0000 pid=3256 clone guuid=f0ede964-1700-0000-d48a-4c395d0d0000 pid=3421 /usr/bin/chmod guuid=727290b1-1600-0000-d48a-4c39590c0000 pid=3161->guuid=f0ede964-1700-0000-d48a-4c395d0d0000 pid=3421 execve guuid=608f5865-1700-0000-d48a-4c395f0d0000 pid=3423 /usr/bin/dash guuid=727290b1-1600-0000-d48a-4c39590c0000 pid=3161->guuid=608f5865-1700-0000-d48a-4c395f0d0000 pid=3423 clone guuid=208d4066-1700-0000-d48a-4c39630d0000 pid=3427 /usr/bin/dash guuid=727290b1-1600-0000-d48a-4c39590c0000 pid=3161->guuid=208d4066-1700-0000-d48a-4c39630d0000 pid=3427 clone guuid=86774ab1-1700-0000-d48a-4c39ec0d0000 pid=3564 /usr/bin/chmod guuid=727290b1-1600-0000-d48a-4c39590c0000 pid=3161->guuid=86774ab1-1700-0000-d48a-4c39ec0d0000 pid=3564 execve guuid=77dbbfb1-1700-0000-d48a-4c39ee0d0000 pid=3566 /usr/bin/dash guuid=727290b1-1600-0000-d48a-4c39590c0000 pid=3161->guuid=77dbbfb1-1700-0000-d48a-4c39ee0d0000 pid=3566 clone guuid=620bcbb2-1700-0000-d48a-4c39f20d0000 pid=3570 /usr/bin/dash guuid=727290b1-1600-0000-d48a-4c39590c0000 pid=3161->guuid=620bcbb2-1700-0000-d48a-4c39f20d0000 pid=3570 clone guuid=438d5b0d-1800-0000-d48a-4c39a20e0000 pid=3746 /usr/bin/chmod guuid=727290b1-1600-0000-d48a-4c39590c0000 pid=3161->guuid=438d5b0d-1800-0000-d48a-4c39a20e0000 pid=3746 execve guuid=3e3dc40d-1800-0000-d48a-4c39a60e0000 pid=3750 /usr/bin/dash guuid=727290b1-1600-0000-d48a-4c39590c0000 pid=3161->guuid=3e3dc40d-1800-0000-d48a-4c39a60e0000 pid=3750 clone guuid=3a23b50f-1800-0000-d48a-4c39ad0e0000 pid=3757 /usr/bin/dash guuid=727290b1-1600-0000-d48a-4c39590c0000 pid=3161->guuid=3a23b50f-1800-0000-d48a-4c39ad0e0000 pid=3757 clone guuid=8585ca5b-1800-0000-d48a-4c39570f0000 pid=3927 /usr/bin/chmod guuid=727290b1-1600-0000-d48a-4c39590c0000 pid=3161->guuid=8585ca5b-1800-0000-d48a-4c39570f0000 pid=3927 execve guuid=ea7a7f5c-1800-0000-d48a-4c39580f0000 pid=3928 /usr/bin/dash guuid=727290b1-1600-0000-d48a-4c39590c0000 pid=3161->guuid=ea7a7f5c-1800-0000-d48a-4c39580f0000 pid=3928 clone guuid=a5694f5d-1800-0000-d48a-4c395c0f0000 pid=3932 /usr/bin/dash guuid=727290b1-1600-0000-d48a-4c39590c0000 pid=3161->guuid=a5694f5d-1800-0000-d48a-4c395c0f0000 pid=3932 clone guuid=1a37bdb4-1800-0000-d48a-4c392b100000 pid=4139 /usr/bin/chmod guuid=727290b1-1600-0000-d48a-4c39590c0000 pid=3161->guuid=1a37bdb4-1800-0000-d48a-4c392b100000 pid=4139 execve guuid=9b9d8eb5-1800-0000-d48a-4c392c100000 pid=4140 /usr/bin/dash guuid=727290b1-1600-0000-d48a-4c39590c0000 pid=3161->guuid=9b9d8eb5-1800-0000-d48a-4c392c100000 pid=4140 clone guuid=4b2492b7-1800-0000-d48a-4c3933100000 pid=4147 /usr/bin/dash guuid=727290b1-1600-0000-d48a-4c39590c0000 pid=3161->guuid=4b2492b7-1800-0000-d48a-4c3933100000 pid=4147 clone guuid=af79d50f-1900-0000-d48a-4c3942110000 pid=4418 /usr/bin/chmod guuid=727290b1-1600-0000-d48a-4c39590c0000 pid=3161->guuid=af79d50f-1900-0000-d48a-4c3942110000 pid=4418 execve guuid=8c783b10-1900-0000-d48a-4c3944110000 pid=4420 /usr/bin/dash guuid=727290b1-1600-0000-d48a-4c39590c0000 pid=3161->guuid=8c783b10-1900-0000-d48a-4c3944110000 pid=4420 clone guuid=eee415b2-1600-0000-d48a-4c395d0c0000 pid=3165 /usr/bin/cat guuid=6139ffb1-1600-0000-d48a-4c395c0c0000 pid=3164->guuid=eee415b2-1600-0000-d48a-4c395d0c0000 pid=3165 execve guuid=ce3b1fb2-1600-0000-d48a-4c395e0c0000 pid=3166 /usr/bin/grep guuid=6139ffb1-1600-0000-d48a-4c395c0c0000 pid=3164->guuid=ce3b1fb2-1600-0000-d48a-4c395e0c0000 pid=3166 execve guuid=d04f24b2-1600-0000-d48a-4c395f0c0000 pid=3167 /usr/bin/grep guuid=6139ffb1-1600-0000-d48a-4c395c0c0000 pid=3164->guuid=d04f24b2-1600-0000-d48a-4c395f0c0000 pid=3167 execve guuid=bb262fb2-1600-0000-d48a-4c39600c0000 pid=3168 /usr/bin/grep guuid=6139ffb1-1600-0000-d48a-4c395c0c0000 pid=3164->guuid=bb262fb2-1600-0000-d48a-4c39600c0000 pid=3168 execve guuid=c8633db2-1600-0000-d48a-4c39610c0000 pid=3169 /usr/bin/cut guuid=6139ffb1-1600-0000-d48a-4c395c0c0000 pid=3164->guuid=c8633db2-1600-0000-d48a-4c39610c0000 pid=3169 execve guuid=66f6bbb4-1600-0000-d48a-4c39670c0000 pid=3175 /usr/bin/cp write-file guuid=35d3b2b4-1600-0000-d48a-4c39660c0000 pid=3174->guuid=66f6bbb4-1600-0000-d48a-4c39670c0000 pid=3175 execve guuid=c021e6b5-1600-0000-d48a-4c39690c0000 pid=3177 /usr/bin/chmod guuid=725cdeb5-1600-0000-d48a-4c39680c0000 pid=3176->guuid=c021e6b5-1600-0000-d48a-4c39690c0000 pid=3177 execve guuid=d63c3cb6-1600-0000-d48a-4c396b0c0000 pid=3179 /usr/bin/wget net send-data write-file guuid=41af30b6-1600-0000-d48a-4c396a0c0000 pid=3178->guuid=d63c3cb6-1600-0000-d48a-4c396b0c0000 pid=3179 execve fbb9a6c5-a595-5199-8d51-c1632aa72f16 94.26.90.217:80 guuid=d63c3cb6-1600-0000-d48a-4c396b0c0000 pid=3179->fbb9a6c5-a595-5199-8d51-c1632aa72f16 send: 136B guuid=c660fc0e-1700-0000-d48a-4c39b90c0000 pid=3257 /usr/bin/wget net send-data write-file guuid=2aedf40e-1700-0000-d48a-4c39b80c0000 pid=3256->guuid=c660fc0e-1700-0000-d48a-4c39b90c0000 pid=3257 execve guuid=c660fc0e-1700-0000-d48a-4c39b90c0000 pid=3257->fbb9a6c5-a595-5199-8d51-c1632aa72f16 send: 136B guuid=86b24c66-1700-0000-d48a-4c39640d0000 pid=3428 /usr/bin/wget net send-data write-file guuid=208d4066-1700-0000-d48a-4c39630d0000 pid=3427->guuid=86b24c66-1700-0000-d48a-4c39640d0000 pid=3428 execve guuid=86b24c66-1700-0000-d48a-4c39640d0000 pid=3428->fbb9a6c5-a595-5199-8d51-c1632aa72f16 send: 136B guuid=3acedcb2-1700-0000-d48a-4c39f30d0000 pid=3571 /usr/bin/wget net send-data write-file guuid=620bcbb2-1700-0000-d48a-4c39f20d0000 pid=3570->guuid=3acedcb2-1700-0000-d48a-4c39f30d0000 pid=3571 execve guuid=3acedcb2-1700-0000-d48a-4c39f30d0000 pid=3571->fbb9a6c5-a595-5199-8d51-c1632aa72f16 send: 136B guuid=d187bd0f-1800-0000-d48a-4c39ae0e0000 pid=3758 /usr/bin/wget net send-data write-file guuid=3a23b50f-1800-0000-d48a-4c39ad0e0000 pid=3757->guuid=d187bd0f-1800-0000-d48a-4c39ae0e0000 pid=3758 execve guuid=d187bd0f-1800-0000-d48a-4c39ae0e0000 pid=3758->fbb9a6c5-a595-5199-8d51-c1632aa72f16 send: 137B guuid=6020575d-1800-0000-d48a-4c395d0f0000 pid=3933 /usr/bin/wget net send-data write-file guuid=a5694f5d-1800-0000-d48a-4c395c0f0000 pid=3932->guuid=6020575d-1800-0000-d48a-4c395d0f0000 pid=3933 execve guuid=6020575d-1800-0000-d48a-4c395d0f0000 pid=3933->fbb9a6c5-a595-5199-8d51-c1632aa72f16 send: 134B guuid=bac897b7-1800-0000-d48a-4c3934100000 pid=4148 /usr/bin/wget net send-data write-file guuid=4b2492b7-1800-0000-d48a-4c3933100000 pid=4147->guuid=bac897b7-1800-0000-d48a-4c3934100000 pid=4148 execve guuid=bac897b7-1800-0000-d48a-4c3934100000 pid=4148->fbb9a6c5-a595-5199-8d51-c1632aa72f16 send: 136B
Threat name:
Linux.Downloader.Generic
Status:
Suspicious
First seen:
2025-06-18 11:59:28 UTC
File Type:
Text (Shell)
AV detection:
8 of 38 (21.05%)
Threat level:
  3/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Modifies registry class
Suspicious use of SetWindowsHookEx
Enumerates physical storage devices
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:ach_202412_suspect_bash_script
Author:abuse.ch
Description:Detects suspicious Linux bash scripts

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh 96d9954c9085811cfeee16319eaf4458b45a36ac2a07e3a9a18f347e1759a6ff

(this sample)

  
Delivery method
Distributed via web download

Comments