MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 9b8b9ccc3232ceb4d86babc759001cce997bce41fcf6fb751f5f1ece01a365eb. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 9


Intelligence 9 IOCs YARA 2 File information Comments

SHA256 hash: 9b8b9ccc3232ceb4d86babc759001cce997bce41fcf6fb751f5f1ece01a365eb
SHA3-384 hash: 44a4e634a2fea1ff04f9113c6b8ac8874101ea73c7ca49cffe4d2ade4052aa4586a6bd2afc275be8571ae872317d566e
SHA1 hash: ecde798dbe057a1f9dc4345fcdf75702f0938a44
MD5 hash: 6ef9535941977dde2b1ff0e4c074a111
humanhash: edward-glucose-utah-romeo
File name:ohshit.sh
Download: download sample
Signature Mirai
File size:2'910 bytes
First seen:2024-10-18 17:30:46 UTC
Last seen:Never
File type: sh
MIME type:text/x-shellscript
ssdeep 48:vM7L7N7hMK6GMgSzPM6KWMQoUM7Q7o7UMf93bMb9RMUcgM3pVMSSOMe+CMNfTM1w:vM7L7N7hMK6GMgSzPM6KWMQoUM7Q7o7Q
TLSH T1B45191C947484E3C3C636A17E6B689683092A2629CF17FD6E9C4BEF1078EF143149753
Magika shell
Reporter NDA0E
Tags:Boatnet botnet mirai sh Yakuza

Intelligence


File Origin
# of uploads :
1
# of downloads :
122
Origin country :
NL NL
Vendor Threat Intelligence
Verdict:
Malicious
Score:
91.7%
Tags:
Trojandownloader Agent
Result
Verdict:
MALICIOUS
Threat name:
Linux.Downloader.Medusa
Status:
Malicious
First seen:
2024-10-18 17:31:10 UTC
File Type:
Text (Shell)
AV detection:
18 of 24 (75.00%)
Threat level:
  3/5
Result
Malware family:
Score:
  10/10
Tags:
family:mirai botnet:lzrd antivm botnet defense_evasion discovery linux upx
Behaviour
Reads runtime system information
System Network Configuration Discovery
Writes file to tmp directory
Checks CPU configuration
UPX packed file
Enumerates running processes
Writes file to system bin folder
File and Directory Permissions Modification
Executes dropped EXE
Modifies Watchdog functionality
Mirai
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Linux_Shellscript_Downloader
Author:albertzsigovits
Description:Generic Approach to Shellscript downloaders
Rule name:ShellScript_Downloader
Author:NDA0E
Description:Detects Generic ShellScript Downloader

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh 9b8b9ccc3232ceb4d86babc759001cce997bce41fcf6fb751f5f1ece01a365eb

(this sample)

  
Delivery method
Distributed via web download

Comments