MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 97152943136962d48167ed8e91825923719c3808b6e9de843d801139693483e5. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 5


Intelligence 5 IOCs YARA 1 File information Comments

SHA256 hash: 97152943136962d48167ed8e91825923719c3808b6e9de843d801139693483e5
SHA3-384 hash: bb4ada9fb0aa31eff1c812dace8618c6a812969a7e2c80447a4c5324d42492a5f64d132cbc9728237c72dac7af99da64
SHA1 hash: 4fc7e4f4413fd9201e4c972b74fbc672a3cc7bc3
MD5 hash: e7f2b635e9cb016f91d8debe134a6582
humanhash: ceiling-vermont-table-pennsylvania
File name:g
Download: download sample
Signature Mirai
File size:505 bytes
First seen:2025-10-24 22:58:32 UTC
Last seen:Never
File type: sh
MIME type:text/plain
ssdeep 6:tfLwVIjZEazG+0FZE1o+jZE8NNIYesaZEUabLK+ovSZE9NZdxhXZEGJN1G:tzwcuYlVNIYJUGvK+okmXhpDw
TLSH T12FF0129B8C52270B08D8FD8571638818503AE2CF7CF69BCFFDDC64A9D1985147126F8A
Magika batch
Reporter abuse_ch
Tags:sh
URLMalware sample (SHA256 hash)SignatureTags
http://23.177.185.39/karmn/an/aelf ua-wget
http://23.177.185.39/karm5843157ebe28a28f5b8d7c695d81e9865e3bcec3b47c93a723d3b1eb8bc69dcb2 Miraielf mirai
http://23.177.185.39/karm6afd441aff2f9f1e23fa2019320423c8b9e7853679906f27df5da4c5120f68979 Miraiarm elf geofenced mirai opendir ua-wget USA
http://23.177.185.39/karm7100d9230a830fe2851c5392c843ecf2d58bfe7de38653b252a4a43581266a172 Miraielf mirai
http://23.177.185.39/kmips3203cde4bf0411aa8962b76dc7d71616d0e5c2511cb6d30d116d3b6e5106d677 Miraielf gafgyt mirai
http://23.177.185.39/kmpsla1c06d051259c38bb04a443331df120fedaa031f909ae8a6586e41a55fa0ccf9 Miraielf mirai

Intelligence


File Origin
# of uploads :
1
# of downloads :
54
Origin country :
DE DE
Vendor Threat Intelligence
Verdict:
Malicious
File Type:
text
First seen:
2025-10-24T20:52:00Z UTC
Last seen:
2025-10-24T21:13:00Z UTC
Hits:
~10
Status:
terminated
Behavior Graph:
%3 guuid=b0c8473a-1800-0000-ca56-3033c50c0000 pid=3269 /usr/bin/sudo guuid=24973e3c-1800-0000-ca56-3033c70c0000 pid=3271 /tmp/sample.bin guuid=b0c8473a-1800-0000-ca56-3033c50c0000 pid=3269->guuid=24973e3c-1800-0000-ca56-3033c70c0000 pid=3271 execve guuid=0d4e773c-1800-0000-ca56-3033c80c0000 pid=3272 /usr/bin/mkdir guuid=24973e3c-1800-0000-ca56-3033c70c0000 pid=3271->guuid=0d4e773c-1800-0000-ca56-3033c80c0000 pid=3272 execve guuid=b576ea3c-1800-0000-ca56-3033ca0c0000 pid=3274 /usr/bin/wget net send-data guuid=24973e3c-1800-0000-ca56-3033c70c0000 pid=3271->guuid=b576ea3c-1800-0000-ca56-3033ca0c0000 pid=3274 execve guuid=9f84a34f-1800-0000-ca56-3033fb0c0000 pid=3323 /usr/bin/chmod guuid=24973e3c-1800-0000-ca56-3033c70c0000 pid=3271->guuid=9f84a34f-1800-0000-ca56-3033fb0c0000 pid=3323 execve guuid=3f8d1350-1800-0000-ca56-3033fd0c0000 pid=3325 /usr/bin/dash guuid=24973e3c-1800-0000-ca56-3033c70c0000 pid=3271->guuid=3f8d1350-1800-0000-ca56-3033fd0c0000 pid=3325 clone guuid=30dd2050-1800-0000-ca56-3033fe0c0000 pid=3326 /usr/bin/rm guuid=24973e3c-1800-0000-ca56-3033c70c0000 pid=3271->guuid=30dd2050-1800-0000-ca56-3033fe0c0000 pid=3326 execve guuid=0cfd6c50-1800-0000-ca56-3033000d0000 pid=3328 /usr/bin/wget net send-data write-file guuid=24973e3c-1800-0000-ca56-3033c70c0000 pid=3271->guuid=0cfd6c50-1800-0000-ca56-3033000d0000 pid=3328 execve guuid=9da9ad7c-1800-0000-ca56-3033610d0000 pid=3425 /usr/bin/chmod guuid=24973e3c-1800-0000-ca56-3033c70c0000 pid=3271->guuid=9da9ad7c-1800-0000-ca56-3033610d0000 pid=3425 execve guuid=710b177d-1800-0000-ca56-3033620d0000 pid=3426 /usr/bin/dash guuid=24973e3c-1800-0000-ca56-3033c70c0000 pid=3271->guuid=710b177d-1800-0000-ca56-3033620d0000 pid=3426 clone guuid=55d4fc7d-1800-0000-ca56-3033660d0000 pid=3430 /usr/bin/rm guuid=24973e3c-1800-0000-ca56-3033c70c0000 pid=3271->guuid=55d4fc7d-1800-0000-ca56-3033660d0000 pid=3430 execve guuid=19cd777e-1800-0000-ca56-3033680d0000 pid=3432 /usr/bin/wget net send-data write-file guuid=24973e3c-1800-0000-ca56-3033c70c0000 pid=3271->guuid=19cd777e-1800-0000-ca56-3033680d0000 pid=3432 execve guuid=5d243baa-1800-0000-ca56-3033bf0d0000 pid=3519 /usr/bin/chmod guuid=24973e3c-1800-0000-ca56-3033c70c0000 pid=3271->guuid=5d243baa-1800-0000-ca56-3033bf0d0000 pid=3519 execve guuid=5fc082aa-1800-0000-ca56-3033c10d0000 pid=3521 /usr/bin/dash guuid=24973e3c-1800-0000-ca56-3033c70c0000 pid=3271->guuid=5fc082aa-1800-0000-ca56-3033c10d0000 pid=3521 clone guuid=d2542eac-1800-0000-ca56-3033c70d0000 pid=3527 /usr/bin/rm guuid=24973e3c-1800-0000-ca56-3033c70c0000 pid=3271->guuid=d2542eac-1800-0000-ca56-3033c70d0000 pid=3527 execve guuid=fa7b6fac-1800-0000-ca56-3033c90d0000 pid=3529 /usr/bin/wget net send-data write-file guuid=24973e3c-1800-0000-ca56-3033c70c0000 pid=3271->guuid=fa7b6fac-1800-0000-ca56-3033c90d0000 pid=3529 execve guuid=0db14fde-1800-0000-ca56-3033160e0000 pid=3606 /usr/bin/chmod guuid=24973e3c-1800-0000-ca56-3033c70c0000 pid=3271->guuid=0db14fde-1800-0000-ca56-3033160e0000 pid=3606 execve guuid=dc48d3de-1800-0000-ca56-3033170e0000 pid=3607 /usr/bin/dash guuid=24973e3c-1800-0000-ca56-3033c70c0000 pid=3271->guuid=dc48d3de-1800-0000-ca56-3033170e0000 pid=3607 clone guuid=0723dce0-1800-0000-ca56-3033190e0000 pid=3609 /usr/bin/rm guuid=24973e3c-1800-0000-ca56-3033c70c0000 pid=3271->guuid=0723dce0-1800-0000-ca56-3033190e0000 pid=3609 execve guuid=cbb06ae1-1800-0000-ca56-30331a0e0000 pid=3610 /usr/bin/wget net send-data write-file guuid=24973e3c-1800-0000-ca56-3033c70c0000 pid=3271->guuid=cbb06ae1-1800-0000-ca56-30331a0e0000 pid=3610 execve guuid=58225d0d-1900-0000-ca56-30335e0e0000 pid=3678 /usr/bin/chmod guuid=24973e3c-1800-0000-ca56-3033c70c0000 pid=3271->guuid=58225d0d-1900-0000-ca56-30335e0e0000 pid=3678 execve guuid=30d9cc0d-1900-0000-ca56-30335f0e0000 pid=3679 /usr/bin/dash guuid=24973e3c-1800-0000-ca56-3033c70c0000 pid=3271->guuid=30d9cc0d-1900-0000-ca56-30335f0e0000 pid=3679 clone guuid=8267ab0f-1900-0000-ca56-3033610e0000 pid=3681 /usr/bin/rm guuid=24973e3c-1800-0000-ca56-3033c70c0000 pid=3271->guuid=8267ab0f-1900-0000-ca56-3033610e0000 pid=3681 execve guuid=d0850110-1900-0000-ca56-3033630e0000 pid=3683 /usr/bin/wget net send-data write-file guuid=24973e3c-1800-0000-ca56-3033c70c0000 pid=3271->guuid=d0850110-1900-0000-ca56-3033630e0000 pid=3683 execve guuid=c7581f3c-1900-0000-ca56-3033eb0e0000 pid=3819 /usr/bin/chmod guuid=24973e3c-1800-0000-ca56-3033c70c0000 pid=3271->guuid=c7581f3c-1900-0000-ca56-3033eb0e0000 pid=3819 execve guuid=68f3713c-1900-0000-ca56-3033ec0e0000 pid=3820 /usr/bin/dash guuid=24973e3c-1800-0000-ca56-3033c70c0000 pid=3271->guuid=68f3713c-1900-0000-ca56-3033ec0e0000 pid=3820 clone guuid=2b39083d-1900-0000-ca56-3033f10e0000 pid=3825 /usr/bin/rm delete-file guuid=24973e3c-1800-0000-ca56-3033c70c0000 pid=3271->guuid=2b39083d-1900-0000-ca56-3033f10e0000 pid=3825 execve ba55188c-1d8c-531d-84cb-0b022f7a1844 23.177.185.39:80 guuid=b576ea3c-1800-0000-ca56-3033ca0c0000 pid=3274->ba55188c-1d8c-531d-84cb-0b022f7a1844 send: 132B guuid=0cfd6c50-1800-0000-ca56-3033000d0000 pid=3328->ba55188c-1d8c-531d-84cb-0b022f7a1844 send: 133B guuid=19cd777e-1800-0000-ca56-3033680d0000 pid=3432->ba55188c-1d8c-531d-84cb-0b022f7a1844 send: 133B guuid=fa7b6fac-1800-0000-ca56-3033c90d0000 pid=3529->ba55188c-1d8c-531d-84cb-0b022f7a1844 send: 133B guuid=cbb06ae1-1800-0000-ca56-30331a0e0000 pid=3610->ba55188c-1d8c-531d-84cb-0b022f7a1844 send: 133B guuid=d0850110-1900-0000-ca56-3033630e0000 pid=3683->ba55188c-1d8c-531d-84cb-0b022f7a1844 send: 133B
Threat name:
Script.Trojan.Malgent
Status:
Malicious
First seen:
2025-10-24 22:39:35 UTC
File Type:
Text (Shell)
AV detection:
12 of 38 (31.58%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Modifies registry class
Suspicious use of SetWindowsHookEx
Enumerates physical storage devices
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:ach_202412_suspect_bash_script
Author:abuse.ch
Description:Detects suspicious Linux bash scripts

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh 97152943136962d48167ed8e91825923719c3808b6e9de843d801139693483e5

(this sample)

  
Delivery method
Distributed via web download

Comments