MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 9b8604e737531e8d70070a413933d65310bd356b70991438e3b579cc5384d94e. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: 9b8604e737531e8d70070a413933d65310bd356b70991438e3b579cc5384d94e
SHA3-384 hash: 8aa0837c34571777598de5a2d93e49b08674011997ccccafe1f77bdab68e35a5f79cff77ff4a16703d9c124657e796ac
SHA1 hash: 4b886e8272d70361c589474517502658277b5d61
MD5 hash: 57d2c9d355be1eda057481bb8f0c7a28
humanhash: arkansas-princess-early-oklahoma
File name:so
Download: download sample
Signature Mirai
File size:996 bytes
First seen:2025-12-21 15:13:22 UTC
Last seen:Never
File type: sh
MIME type:text/x-shellscript
ssdeep 24:X7NXYa7AHYa7VYa7eYa7vRdYa7WYa7geYa7beYa7GYa73XYa7n9Yy:XeaLaCadaboata8a5aFaLoaay
TLSH T11E11215E1309A9A590CDE87937D1830CB4804BCD397707595D9A41BD54E06CE73B892A
TrID 70.0% (.SH) Linux/UNIX shell script (7000/1)
30.0% (.) Unix-like shebang (var.3) (gen) (3000/1)
Magika shell
Reporter abuse_ch
Tags:sh
URLMalware sample (SHA256 hash)SignatureTags
http://130.12.180.64/zerarma46f71b632037aee2b1ae468559467ec5d2787ad04b17873b6450c2b80ac00b7 Miraielf mirai ua-wget
http://130.12.180.64/zerarm5dc4a700f935dd717813708581615f6f11339a75d997b63150f13b53c021e4529 Miraielf mirai ua-wget
http://130.12.180.64/zerarm6052fd5e6d661ad5b1b87783775da7eaf1f1a1b2f6a5f6175e54b6f7aa9925c32 Miraielf mirai ua-wget
http://130.12.180.64/zerarm7bd93f3b53d2702bddb071a835ced4d7e9ba493d72331cd651307ad78da154e74 Miraielf mirai ua-wget
http://130.12.180.64/zerm68kc6ba8a7005cec730afefc2f69865512c986bf08fd201345c83ced08ec8df4ef3 Miraielf mirai ua-wget
http://130.12.180.64/zermips0fc47e51b950d0c9feef18299d94898980682002b327e5604c86c6ea9ba51ebc Miraielf mirai ua-wget
http://130.12.180.64/zermpslbad8bf32d2d85ab9261f2236de947c154db5f19a9967c687c8e98a9e23e6d7fe Miraielf mirai ua-wget
http://130.12.180.64/zerppc4336f2ee02e9db6bcd78cac01c923518a50447a9e9a00f58d0442a4df82f9685 Miraielf mirai ua-wget
http://130.12.180.64/zersh4e236100a8e4f0b50fa34578357b985d38d282dae316808ce8eafd06144bdaebd Miraielf mirai ua-wget
http://130.12.180.64/zerspc0c7034c3da6ec9c6b44decab07f8a01ce53b4d830550ab4887b37abba5c54500 Miraielf mirai ua-wget
http://130.12.180.64/zerx86de816ec819eb958b508450496a4c4b9d56b0cdb481452609bc27e023a5c648bc Miraielf mirai ua-wget

Intelligence


File Origin
# of uploads :
1
# of downloads :
38
Origin country :
DE DE
Vendor Threat Intelligence
No detections
Verdict:
Malicious
Labled as:
Trojan[Downloader]/Shell.Agent
Verdict:
Malicious
File Type:
unix shell
First seen:
2025-12-21T12:33:00Z UTC
Last seen:
2025-12-23T12:48:00Z UTC
Hits:
~10
Detections:
HEUR:Trojan-Downloader.Shell.Agent.a HEUR:Trojan-Downloader.Shell.Agent.p
Status:
terminated
Behavior Graph:
%3 guuid=b0838290-1a00-0000-3f4f-86d7d7090000 pid=2519 /usr/bin/sudo guuid=61b08d92-1a00-0000-3f4f-86d7dc090000 pid=2524 /tmp/sample.bin guuid=b0838290-1a00-0000-3f4f-86d7d7090000 pid=2519->guuid=61b08d92-1a00-0000-3f4f-86d7dc090000 pid=2524 execve
Threat name:
Win32.Trojan.Vigorf
Status:
Malicious
First seen:
2025-12-21 15:29:23 UTC
File Type:
Text (Shell)
AV detection:
15 of 24 (62.50%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  1/10
Tags:
linux
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh 9b8604e737531e8d70070a413933d65310bd356b70991438e3b579cc5384d94e

(this sample)

  
Delivery method
Distributed via web download

Comments