MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 997fdec9ca58e68e9342fed8c7e8a0879690fac0b7832a9beaa63dc7fd5c9c07. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 6


Intelligence 6 IOCs YARA 1 File information Comments

SHA256 hash: 997fdec9ca58e68e9342fed8c7e8a0879690fac0b7832a9beaa63dc7fd5c9c07
SHA3-384 hash: 5a20a3a2dab51aa43dd9428b2834deebaae60899622dc6c0a296e185ad431c1c5eeecb0642c7578e932ce4bb91163923
SHA1 hash: b691320013037638839821edc895db473e9fd517
MD5 hash: de12b2d6277ae7244302d6a935e1ee03
humanhash: asparagus-zulu-river-mirror
File name:lil.sh
Download: download sample
Signature Mirai
File size:249 bytes
First seen:2025-12-21 14:59:05 UTC
Last seen:Never
File type: sh
MIME type:text/plain
ssdeep 3:GRFdVZKaaDSIQ1MVG38dVZKL5KzSIOuIh8dVZKhNIOSIHK+uFfEw8dVZKtFGN3zm:Sd8GMdqLidYNIl5shdQFa0LKiX
TLSH T1FFD02E8F302113B30B8CCF20E4A22C80200993C209B08B28BCDFBC2AB8ED700331CB24
Magika batch
Reporter abuse_ch
Tags:mirai sh
URLMalware sample (SHA256 hash)SignatureTags
http://130.12.180.64/arm26fab8de175aca6ef673bb6e6c59d86b913499b1415ea468714ed96c03c4826d Miraielf gafgyt mirai ua-wget
http://130.12.180.64/arm5dadbc08dc2068913a10a9def07534f92430f2eb186991c4466b9400f86455152 Miraielf gafgyt mirai ua-wget
http://130.12.180.64/arm6267f134519d86c6c219e437ba64132f8715c58bd67b116e7faca50ebe0ea2f37 Miraielf mirai ua-wget
http://130.12.180.64/arm7c6a54cd9814f2e3d9331776b118ba6025eb898e92a123355da5c057c4a081f0a Miraielf mirai ua-wget

Intelligence


File Origin
# of uploads :
1
# of downloads :
32
Origin country :
DE DE
Vendor Threat Intelligence
No detections
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
mirai
Verdict:
Malicious
File Type:
text
First seen:
2025-12-21T13:19:00Z UTC
Last seen:
2025-12-21T15:02:00Z UTC
Hits:
~10
Status:
terminated
Behavior Graph:
%3 guuid=8f134fcc-1800-0000-bf4d-78bd01090000 pid=2305 /usr/bin/sudo guuid=fa5165ce-1800-0000-bf4d-78bd03090000 pid=2307 /tmp/sample.bin guuid=8f134fcc-1800-0000-bf4d-78bd01090000 pid=2305->guuid=fa5165ce-1800-0000-bf4d-78bd03090000 pid=2307 execve guuid=6236a4d0-1800-0000-bf4d-78bd04090000 pid=2308 /usr/bin/wget net send-data write-file guuid=fa5165ce-1800-0000-bf4d-78bd03090000 pid=2307->guuid=6236a4d0-1800-0000-bf4d-78bd04090000 pid=2308 execve guuid=284335d6-1800-0000-bf4d-78bd0d090000 pid=2317 /usr/bin/chmod guuid=fa5165ce-1800-0000-bf4d-78bd03090000 pid=2307->guuid=284335d6-1800-0000-bf4d-78bd0d090000 pid=2317 execve guuid=6f0e8fd6-1800-0000-bf4d-78bd0f090000 pid=2319 /usr/bin/dash guuid=fa5165ce-1800-0000-bf4d-78bd03090000 pid=2307->guuid=6f0e8fd6-1800-0000-bf4d-78bd0f090000 pid=2319 clone guuid=5ed621d8-1800-0000-bf4d-78bd13090000 pid=2323 /usr/bin/wget net send-data write-file guuid=fa5165ce-1800-0000-bf4d-78bd03090000 pid=2307->guuid=5ed621d8-1800-0000-bf4d-78bd13090000 pid=2323 execve guuid=b3b53adc-1800-0000-bf4d-78bd1b090000 pid=2331 /usr/bin/chmod guuid=fa5165ce-1800-0000-bf4d-78bd03090000 pid=2307->guuid=b3b53adc-1800-0000-bf4d-78bd1b090000 pid=2331 execve guuid=c76385dc-1800-0000-bf4d-78bd1c090000 pid=2332 /usr/bin/dash guuid=fa5165ce-1800-0000-bf4d-78bd03090000 pid=2307->guuid=c76385dc-1800-0000-bf4d-78bd1c090000 pid=2332 clone guuid=8e2768de-1800-0000-bf4d-78bd1f090000 pid=2335 /usr/bin/wget net send-data write-file guuid=fa5165ce-1800-0000-bf4d-78bd03090000 pid=2307->guuid=8e2768de-1800-0000-bf4d-78bd1f090000 pid=2335 execve guuid=e987a1e2-1800-0000-bf4d-78bd28090000 pid=2344 /usr/bin/chmod guuid=fa5165ce-1800-0000-bf4d-78bd03090000 pid=2307->guuid=e987a1e2-1800-0000-bf4d-78bd28090000 pid=2344 execve guuid=5d49e3e2-1800-0000-bf4d-78bd2a090000 pid=2346 /usr/bin/dash guuid=fa5165ce-1800-0000-bf4d-78bd03090000 pid=2307->guuid=5d49e3e2-1800-0000-bf4d-78bd2a090000 pid=2346 clone guuid=eb1a69e3-1800-0000-bf4d-78bd2d090000 pid=2349 /usr/bin/wget net send-data write-file guuid=fa5165ce-1800-0000-bf4d-78bd03090000 pid=2307->guuid=eb1a69e3-1800-0000-bf4d-78bd2d090000 pid=2349 execve guuid=339dd3e7-1800-0000-bf4d-78bd37090000 pid=2359 /usr/bin/chmod guuid=fa5165ce-1800-0000-bf4d-78bd03090000 pid=2307->guuid=339dd3e7-1800-0000-bf4d-78bd37090000 pid=2359 execve guuid=893828e8-1800-0000-bf4d-78bd38090000 pid=2360 /usr/bin/dash guuid=fa5165ce-1800-0000-bf4d-78bd03090000 pid=2307->guuid=893828e8-1800-0000-bf4d-78bd38090000 pid=2360 clone f22fee75-ab34-540d-95fe-696883c6f4ad 130.12.180.64:80 guuid=6236a4d0-1800-0000-bf4d-78bd04090000 pid=2308->f22fee75-ab34-540d-95fe-696883c6f4ad send: 131B guuid=5ed621d8-1800-0000-bf4d-78bd13090000 pid=2323->f22fee75-ab34-540d-95fe-696883c6f4ad send: 132B guuid=8e2768de-1800-0000-bf4d-78bd1f090000 pid=2335->f22fee75-ab34-540d-95fe-696883c6f4ad send: 132B guuid=eb1a69e3-1800-0000-bf4d-78bd2d090000 pid=2349->f22fee75-ab34-540d-95fe-696883c6f4ad send: 132B
Threat name:
Linux.Worm.Mirai
Status:
Malicious
First seen:
2025-12-21 15:00:35 UTC
File Type:
Text (Shell)
AV detection:
7 of 36 (19.44%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Modifies registry class
Suspicious use of SetWindowsHookEx
Enumerates physical storage devices
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:MAL_Linux_IoT_MultiArch_BotnetLoader_Generic
Author:Anish Bogati
Description:Technique-based detection of IoT/Linux botnet loader shell scripts downloading binaries from numeric IPs, chmodding, and executing multi-architecture payloads
Reference:MalwareBazaar sample lilin.sh

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh 997fdec9ca58e68e9342fed8c7e8a0879690fac0b7832a9beaa63dc7fd5c9c07

(this sample)

  
Delivery method
Distributed via web download

Comments