MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 9c2c65216f91d93de214d81bdec0dd067e079d81a8fd618c45eef8437e162a1d. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 10


Intelligence 10 IOCs YARA 1 File information Comments

SHA256 hash: 9c2c65216f91d93de214d81bdec0dd067e079d81a8fd618c45eef8437e162a1d
SHA3-384 hash: 47d95bf283902424232c92ab0b0fc4a2eb853f7bc0070c6451c81bedef3c11023ef4b9fafd17992c70bc606d19de07b8
SHA1 hash: 688279dad3809e88aceecafdcebbfba7dcd870ae
MD5 hash: c9b559b4a8e1def2037f1c5a8ea0993c
humanhash: video-virginia-texas-freddie
File name:mao_http.sh
Download: download sample
Signature Mirai
File size:3'211 bytes
First seen:2026-02-03 09:14:17 UTC
Last seen:Never
File type: sh
MIME type:text/x-shellscript
ssdeep 96:geEUuA1gZW8YKmsKo5MZmzizgSwGMIaMGSweSQ:4Sn
TLSH T1FF612BFD41A0BF93CC85A94CBA2483A1730B91F5FD72F63C9C584A6A4481B15349BEBD
TrID 70.0% (.SH) Linux/UNIX shell script (7000/1)
30.0% (.) Unix-like shebang (var.3) (gen) (3000/1)
Magika shell
Reporter abuse_ch
Tags:mirai sh
URLMalware sample (SHA256 hash)SignatureTags
http://185.242.3.127/bins/mao.x86_641b9e17462a47afb7ba79400f147f699ca70909f51a971bab80e20177ae024ef3 Miraielf mirai ua-wget
http://185.242.3.127/bins/mao.x86201c0b78693a3091d9a7e26aa7110c77beb13289ea5978f1edd4b1359567ea6e Miraielf mirai ua-wget
http://185.242.3.127/bins/mao.mipseb83574b4e79b73f2669e257643a06811b5a3d392ebc8597130bc8102b4a6b7f Miraielf mirai ua-wget
http://185.242.3.127/bins/mao.mpslc39ce9aeb58024de86d0df1aaed297a308cf59745d0c8589db81902cdb402bb5 Miraielf mirai ua-wget
http://185.242.3.127/bins/mao.arm37511f960894bb1bec92f792eb9a772a6a7926596155cbe3f60ca2b81a04e743 Miraielf mirai ua-wget
http://185.242.3.127/bins/mao.arm5f2eb51eaf6ec0d4e1293922014c2df9fd4fa62ade85fc2e47c56269d37c030ba Miraielf mirai ua-wget
http://185.242.3.127/bins/mao.arm665c1b5a4909e6f0bad16e48d4005f68d453936b72256564900537445582b0591 Miraielf mirai ua-wget
http://185.242.3.127/bins/mao.arm748737f8fa20358f195fb9670e6ee0444c9760f50f02bda7d78472dbfd0a08bab Miraielf mirai ua-wget
http://185.242.3.127/bins/mao.ppce66306f6a71cb948e0b5f4e55e5159a2380e8d61d3923380ce25264db244aeee Miraielf mirai ua-wget
http://185.242.3.127/bins/mao.m68ke7b3c9c00f79eca8e50a27c0462ff5f0cd3ac4148200508aa77b3eef21fd1cbb Miraielf mirai ua-wget
http://185.242.3.127/bins/mao.sh42fce8de8728f1291b308fa7f5d4f096e83e4bc90df63645d7de50e7c62463934 Miraielf mirai ua-wget
http://185.242.3.127/bins/mao.spce2b29014d4de16f628b0785438dd2de9a4003af819e7f9a266bd751415764b2b Miraielf mirai ua-wget
http://185.242.3.127/bins/mao.arc0cce20071a014da88feb55d7935d8525390f1bb31cc8259018f57ed1bb1292fd Miraielf mirai ua-wget
http://185.242.3.127/bins/mao.i68658c9220ae7d6e5e39d2fe77cb2a3d9df5929572ba2f8cab82e2b0e2f2ab5b13f Miraielf mirai ua-wget
http://185.242.3.127/bins/mao.i4860029fe67bf75b12aa1497f5302e59294502f57f59dd47d0c7d8e9a376794adf5 Miraielf mirai ua-wget

Intelligence


File Origin
# of uploads :
1
# of downloads :
64
Origin country :
DE DE
Vendor Threat Intelligence
No detections
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
bash evasive lolbin mirai obfuscated
Verdict:
Malicious
File Type:
unix shell
First seen:
2026-02-03T06:21:00Z UTC
Last seen:
2026-02-03T08:40:00Z UTC
Hits:
~10
Detections:
HEUR:Trojan-Downloader.Shell.Agent.a
Status:
terminated
Behavior Graph:
%3 guuid=c178c904-1700-0000-feeb-2626960d0000 pid=3478 /usr/bin/sudo guuid=32f7ed06-1700-0000-feeb-26269e0d0000 pid=3486 /tmp/sample.bin guuid=c178c904-1700-0000-feeb-2626960d0000 pid=3478->guuid=32f7ed06-1700-0000-feeb-26269e0d0000 pid=3486 execve guuid=01a04d07-1700-0000-feeb-26269f0d0000 pid=3487 /usr/bin/wget net send-data write-file guuid=32f7ed06-1700-0000-feeb-26269e0d0000 pid=3486->guuid=01a04d07-1700-0000-feeb-26269f0d0000 pid=3487 execve guuid=a9f57b0c-1700-0000-feeb-2626a00d0000 pid=3488 /usr/bin/chmod guuid=32f7ed06-1700-0000-feeb-26269e0d0000 pid=3486->guuid=a9f57b0c-1700-0000-feeb-2626a00d0000 pid=3488 execve guuid=05dbbd0c-1700-0000-feeb-2626a10d0000 pid=3489 /tmp/mao_bot net guuid=32f7ed06-1700-0000-feeb-26269e0d0000 pid=3486->guuid=05dbbd0c-1700-0000-feeb-2626a10d0000 pid=3489 execve guuid=24801610-1700-0000-feeb-2626aa0d0000 pid=3498 /usr/bin/curl net send-data write-file guuid=32f7ed06-1700-0000-feeb-26269e0d0000 pid=3486->guuid=24801610-1700-0000-feeb-2626aa0d0000 pid=3498 execve guuid=b43ae419-1700-0000-feeb-2626c20d0000 pid=3522 /usr/bin/chmod guuid=32f7ed06-1700-0000-feeb-26269e0d0000 pid=3486->guuid=b43ae419-1700-0000-feeb-2626c20d0000 pid=3522 execve guuid=2ec7251a-1700-0000-feeb-2626c30d0000 pid=3523 /tmp/mao_bot net guuid=32f7ed06-1700-0000-feeb-26269e0d0000 pid=3486->guuid=2ec7251a-1700-0000-feeb-2626c30d0000 pid=3523 execve guuid=5d9b041d-1700-0000-feeb-2626cc0d0000 pid=3532 /usr/bin/wget net send-data write-file guuid=32f7ed06-1700-0000-feeb-26269e0d0000 pid=3486->guuid=5d9b041d-1700-0000-feeb-2626cc0d0000 pid=3532 execve guuid=7956f023-1700-0000-feeb-2626e50d0000 pid=3557 /usr/bin/chmod guuid=32f7ed06-1700-0000-feeb-26269e0d0000 pid=3486->guuid=7956f023-1700-0000-feeb-2626e50d0000 pid=3557 execve guuid=0fce3f24-1700-0000-feeb-2626e70d0000 pid=3559 /tmp/mao_bot net guuid=32f7ed06-1700-0000-feeb-26269e0d0000 pid=3486->guuid=0fce3f24-1700-0000-feeb-2626e70d0000 pid=3559 execve 4961af98-ecbe-5da4-a0d2-a0d40ca0d25a 185.242.3.127:80 guuid=01a04d07-1700-0000-feeb-26269f0d0000 pid=3487->4961af98-ecbe-5da4-a0d2-a0d40ca0d25a send: 143B 8b0a01dc-0728-52c1-8024-c4ba7801b8d6 8.8.8.8:53 guuid=05dbbd0c-1700-0000-feeb-2626a10d0000 pid=3489->8b0a01dc-0728-52c1-8024-c4ba7801b8d6 con guuid=24801610-1700-0000-feeb-2626aa0d0000 pid=3498->4961af98-ecbe-5da4-a0d2-a0d40ca0d25a send: 92B guuid=2ec7251a-1700-0000-feeb-2626c30d0000 pid=3523->8b0a01dc-0728-52c1-8024-c4ba7801b8d6 con guuid=5d9b041d-1700-0000-feeb-2626cc0d0000 pid=3532->4961af98-ecbe-5da4-a0d2-a0d40ca0d25a send: 140B guuid=0fce3f24-1700-0000-feeb-2626e70d0000 pid=3559->8b0a01dc-0728-52c1-8024-c4ba7801b8d6 con guuid=07326624-1700-0000-feeb-2626e80d0000 pid=3560 /tmp/mao_bot guuid=0fce3f24-1700-0000-feeb-2626e70d0000 pid=3559->guuid=07326624-1700-0000-feeb-2626e80d0000 pid=3560 clone guuid=f8046924-1700-0000-feeb-2626e90d0000 pid=3561 /tmp/mao_bot dns net send-data zombie guuid=0fce3f24-1700-0000-feeb-2626e70d0000 pid=3559->guuid=f8046924-1700-0000-feeb-2626e90d0000 pid=3561 clone guuid=f8046924-1700-0000-feeb-2626e90d0000 pid=3561->8b0a01dc-0728-52c1-8024-c4ba7801b8d6 send: 87B a11803fe-5fd8-544d-b13b-84f58f3c81f8 mn.34509.su:25565 guuid=f8046924-1700-0000-feeb-2626e90d0000 pid=3561->a11803fe-5fd8-544d-b13b-84f58f3c81f8 send: 26B guuid=00748024-1700-0000-feeb-2626eb0d0000 pid=3563 /tmp/mao_bot guuid=f8046924-1700-0000-feeb-2626e90d0000 pid=3561->guuid=00748024-1700-0000-feeb-2626eb0d0000 pid=3563 clone guuid=3dd78324-1700-0000-feeb-2626ec0d0000 pid=3564 /tmp/mao_bot dns net send-data guuid=f8046924-1700-0000-feeb-2626e90d0000 pid=3561->guuid=3dd78324-1700-0000-feeb-2626ec0d0000 pid=3564 clone guuid=3dd78324-1700-0000-feeb-2626ec0d0000 pid=3564->8b0a01dc-0728-52c1-8024-c4ba7801b8d6 send: 87B guuid=3dd78324-1700-0000-feeb-2626ec0d0000 pid=3564->a11803fe-5fd8-544d-b13b-84f58f3c81f8 send: 26B
Gathering data
Threat name:
Script-Shell.Trojan.Vigorf
Status:
Malicious
First seen:
2026-02-03 09:17:16 UTC
File Type:
Text (Shell)
AV detection:
10 of 24 (41.67%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:mirai antivm botnet defense_evasion discovery linux
Behaviour
Reads runtime system information
System Network Configuration Discovery
Writes file to tmp directory
Changes its process name
Checks CPU configuration
File and Directory Permissions Modification
Executes dropped EXE
Modifies Watchdog functionality
Creates a large amount of network flows
Mirai
Mirai family
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:MAL_Linux_IoT_MultiArch_BotnetLoader_Generic
Author:Anish Bogati
Description:Technique-based detection of IoT/Linux botnet loader shell scripts downloading binaries from numeric IPs, chmodding, and executing multi-architecture payloads
Reference:MalwareBazaar sample lilin.sh

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh 9c2c65216f91d93de214d81bdec0dd067e079d81a8fd618c45eef8437e162a1d

(this sample)

  
Delivery method
Distributed via web download

Comments