MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 9e2c9d6298415bee8acdc22b9077799e9da9959c0600f4d1bc38ab168a1365e6. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: 9e2c9d6298415bee8acdc22b9077799e9da9959c0600f4d1bc38ab168a1365e6
SHA3-384 hash: 00d8013af41a4ffdb111ae8d9192fc10dfc394883698bba7fac1e5cde885a88b3ded306d590f9822d7a67c59cf226bb8
SHA1 hash: 1e1408913019ad08d5e0172fd8d3ff079da0c532
MD5 hash: 38acea2876395a828314ec64ffb0407b
humanhash: carolina-pennsylvania-california-cat
File name:wget.sh
Download: download sample
Signature Mirai
File size:834 bytes
First seen:2025-10-14 06:18:31 UTC
Last seen:2025-10-14 19:12:04 UTC
File type: sh
MIME type:text/plain
ssdeep 12:zhpY6NIl580LK2+OF/jMJTtj5SOZ1tfBqVn:/Y6NI7/K2+I/juT55lHtfBOn
TLSH T1910133DEB332A4A38A088F35B0614445D02AB9C936974F5E5CCA04FAD8D6500F135F6F
Magika asm
Reporter abuse_ch
Tags:mirai sh
URLMalware sample (SHA256 hash)SignatureTags
http://194.238.26.136/systemcl/arm0aa6fd4f78bcee9f77a93153de85f0db4aa2e42464afcad9564ef46528697d44 Miraielf mirai
http://194.238.26.136/systemcl/arm54b3fafa6af227c69f3164a2b4f85e7024361a714347c7f691099ed80736916ab Miraielf mirai
http://194.238.26.136/systemcl/arm6899c7e47c4e8f921e14bed7dcca677ed995ead6369168433011cac67ef6e5a59 Miraielf mirai
http://194.238.26.136/systemcl/arm7527debaef309134677a1c3a450dc5aea1f3a2a6f742fad86a20c80274c749630 Miraielf mirai
http://194.238.26.136/systemcl/m68kb819a17fd9314f13890dce05291b4c14b40477f0546c7481b4c2af576928244e Miraielf mirai
http://194.238.26.136/systemcl/mipsdc49d000be3daa749c372da39aad50bc49e8d944c7c868fb70b7d15e159d79d3 Miraielf mirai
http://194.238.26.136/systemcl/mpslc5da1b833565988e4bb1729244b07d55ff21148392a7143ff5aab70f43788d6b Miraielf mirai
http://194.238.26.136/systemcl/ppcdcd7d4b917223e33897da06b7fdb676d16aa4d7afc0276bb4525c275b0a45b10 Miraielf mirai
http://194.238.26.136/systemcl/sh4n/an/an/a
http://194.238.26.136/systemcl/spcn/an/an/a
http://194.238.26.136/systemcl/x86d167fe5abe306825e029bd799bb645048ccae15dca31ea4ac9fcb8b416142a3a Miraielf mirai
http://194.238.26.136/systemcl/x86_64d167fe5abe306825e029bd799bb645048ccae15dca31ea4ac9fcb8b416142a3a Miraielf mirai

Intelligence


File Origin
# of uploads :
2
# of downloads :
36
Origin country :
DE DE
Vendor Threat Intelligence
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
evasive exploit mirai
Verdict:
Malicious
File Type:
text
First seen:
2025-10-13T15:31:00Z UTC
Last seen:
2025-10-13T15:43:00Z UTC
Hits:
~10
Status:
terminated
Behavior Graph:
%3 guuid=0710582a-1900-0000-4a09-78c88d0b0000 pid=2957 /usr/bin/sudo guuid=f3b9f42c-1900-0000-4a09-78c8940b0000 pid=2964 /tmp/sample.bin guuid=0710582a-1900-0000-4a09-78c88d0b0000 pid=2957->guuid=f3b9f42c-1900-0000-4a09-78c8940b0000 pid=2964 execve guuid=dc8a3e2d-1900-0000-4a09-78c8950b0000 pid=2965 /usr/bin/wget net send-data write-file guuid=f3b9f42c-1900-0000-4a09-78c8940b0000 pid=2964->guuid=dc8a3e2d-1900-0000-4a09-78c8950b0000 pid=2965 execve guuid=2de96b43-1900-0000-4a09-78c8c20b0000 pid=3010 /usr/bin/chmod guuid=f3b9f42c-1900-0000-4a09-78c8940b0000 pid=2964->guuid=2de96b43-1900-0000-4a09-78c8c20b0000 pid=3010 execve guuid=1d80da43-1900-0000-4a09-78c8c40b0000 pid=3012 /usr/bin/dash guuid=f3b9f42c-1900-0000-4a09-78c8940b0000 pid=2964->guuid=1d80da43-1900-0000-4a09-78c8c40b0000 pid=3012 clone guuid=df26a045-1900-0000-4a09-78c8ca0b0000 pid=3018 /usr/bin/wget net send-data write-file guuid=f3b9f42c-1900-0000-4a09-78c8940b0000 pid=2964->guuid=df26a045-1900-0000-4a09-78c8ca0b0000 pid=3018 execve guuid=4e36bc58-1900-0000-4a09-78c8f50b0000 pid=3061 /usr/bin/chmod guuid=f3b9f42c-1900-0000-4a09-78c8940b0000 pid=2964->guuid=4e36bc58-1900-0000-4a09-78c8f50b0000 pid=3061 execve guuid=c9911059-1900-0000-4a09-78c8f70b0000 pid=3063 /usr/bin/dash guuid=f3b9f42c-1900-0000-4a09-78c8940b0000 pid=2964->guuid=c9911059-1900-0000-4a09-78c8f70b0000 pid=3063 clone guuid=e35cac59-1900-0000-4a09-78c8fa0b0000 pid=3066 /usr/bin/wget net send-data write-file guuid=f3b9f42c-1900-0000-4a09-78c8940b0000 pid=2964->guuid=e35cac59-1900-0000-4a09-78c8fa0b0000 pid=3066 execve guuid=011eec72-1900-0000-4a09-78c81b0c0000 pid=3099 /usr/bin/chmod guuid=f3b9f42c-1900-0000-4a09-78c8940b0000 pid=2964->guuid=011eec72-1900-0000-4a09-78c81b0c0000 pid=3099 execve guuid=718b4b73-1900-0000-4a09-78c81d0c0000 pid=3101 /usr/bin/dash guuid=f3b9f42c-1900-0000-4a09-78c8940b0000 pid=2964->guuid=718b4b73-1900-0000-4a09-78c81d0c0000 pid=3101 clone guuid=537b7075-1900-0000-4a09-78c8210c0000 pid=3105 /usr/bin/wget net send-data write-file guuid=f3b9f42c-1900-0000-4a09-78c8940b0000 pid=2964->guuid=537b7075-1900-0000-4a09-78c8210c0000 pid=3105 execve guuid=ab126591-1900-0000-4a09-78c8650c0000 pid=3173 /usr/bin/chmod guuid=f3b9f42c-1900-0000-4a09-78c8940b0000 pid=2964->guuid=ab126591-1900-0000-4a09-78c8650c0000 pid=3173 execve guuid=392d3192-1900-0000-4a09-78c8670c0000 pid=3175 /usr/bin/dash guuid=f3b9f42c-1900-0000-4a09-78c8940b0000 pid=2964->guuid=392d3192-1900-0000-4a09-78c8670c0000 pid=3175 clone guuid=119c1094-1900-0000-4a09-78c86a0c0000 pid=3178 /usr/bin/wget net send-data write-file guuid=f3b9f42c-1900-0000-4a09-78c8940b0000 pid=2964->guuid=119c1094-1900-0000-4a09-78c86a0c0000 pid=3178 execve guuid=fdc28aae-1900-0000-4a09-78c8820c0000 pid=3202 /usr/bin/chmod guuid=f3b9f42c-1900-0000-4a09-78c8940b0000 pid=2964->guuid=fdc28aae-1900-0000-4a09-78c8820c0000 pid=3202 execve guuid=6802ebae-1900-0000-4a09-78c8830c0000 pid=3203 /usr/bin/dash guuid=f3b9f42c-1900-0000-4a09-78c8940b0000 pid=2964->guuid=6802ebae-1900-0000-4a09-78c8830c0000 pid=3203 clone guuid=138c7eaf-1900-0000-4a09-78c8860c0000 pid=3206 /usr/bin/wget net send-data write-file guuid=f3b9f42c-1900-0000-4a09-78c8940b0000 pid=2964->guuid=138c7eaf-1900-0000-4a09-78c8860c0000 pid=3206 execve guuid=668ce4c9-1900-0000-4a09-78c89f0c0000 pid=3231 /usr/bin/chmod guuid=f3b9f42c-1900-0000-4a09-78c8940b0000 pid=2964->guuid=668ce4c9-1900-0000-4a09-78c89f0c0000 pid=3231 execve guuid=27476cca-1900-0000-4a09-78c8a00c0000 pid=3232 /usr/bin/dash guuid=f3b9f42c-1900-0000-4a09-78c8940b0000 pid=2964->guuid=27476cca-1900-0000-4a09-78c8a00c0000 pid=3232 clone guuid=d01b8ecb-1900-0000-4a09-78c8a20c0000 pid=3234 /usr/bin/wget net send-data write-file guuid=f3b9f42c-1900-0000-4a09-78c8940b0000 pid=2964->guuid=d01b8ecb-1900-0000-4a09-78c8a20c0000 pid=3234 execve guuid=b65e69e6-1900-0000-4a09-78c8b80c0000 pid=3256 /usr/bin/chmod guuid=f3b9f42c-1900-0000-4a09-78c8940b0000 pid=2964->guuid=b65e69e6-1900-0000-4a09-78c8b80c0000 pid=3256 execve guuid=520202e7-1900-0000-4a09-78c8b90c0000 pid=3257 /usr/bin/dash guuid=f3b9f42c-1900-0000-4a09-78c8940b0000 pid=2964->guuid=520202e7-1900-0000-4a09-78c8b90c0000 pid=3257 clone guuid=5768d7e7-1900-0000-4a09-78c8bb0c0000 pid=3259 /usr/bin/wget net send-data write-file guuid=f3b9f42c-1900-0000-4a09-78c8940b0000 pid=2964->guuid=5768d7e7-1900-0000-4a09-78c8bb0c0000 pid=3259 execve guuid=8336df00-1a00-0000-4a09-78c8d10c0000 pid=3281 /usr/bin/chmod guuid=f3b9f42c-1900-0000-4a09-78c8940b0000 pid=2964->guuid=8336df00-1a00-0000-4a09-78c8d10c0000 pid=3281 execve guuid=49041302-1a00-0000-4a09-78c8d20c0000 pid=3282 /usr/bin/dash guuid=f3b9f42c-1900-0000-4a09-78c8940b0000 pid=2964->guuid=49041302-1a00-0000-4a09-78c8d20c0000 pid=3282 clone guuid=892eae04-1a00-0000-4a09-78c8d50c0000 pid=3285 /usr/bin/wget net send-data guuid=f3b9f42c-1900-0000-4a09-78c8940b0000 pid=2964->guuid=892eae04-1a00-0000-4a09-78c8d50c0000 pid=3285 execve guuid=1f751012-1a00-0000-4a09-78c8f20c0000 pid=3314 /usr/bin/chmod guuid=f3b9f42c-1900-0000-4a09-78c8940b0000 pid=2964->guuid=1f751012-1a00-0000-4a09-78c8f20c0000 pid=3314 execve guuid=fee04512-1a00-0000-4a09-78c8f40c0000 pid=3316 /usr/bin/dash guuid=f3b9f42c-1900-0000-4a09-78c8940b0000 pid=2964->guuid=fee04512-1a00-0000-4a09-78c8f40c0000 pid=3316 clone guuid=b3fc5212-1a00-0000-4a09-78c8f50c0000 pid=3317 /usr/bin/wget net send-data guuid=f3b9f42c-1900-0000-4a09-78c8940b0000 pid=2964->guuid=b3fc5212-1a00-0000-4a09-78c8f50c0000 pid=3317 execve guuid=713f3d1f-1a00-0000-4a09-78c8190d0000 pid=3353 /usr/bin/chmod guuid=f3b9f42c-1900-0000-4a09-78c8940b0000 pid=2964->guuid=713f3d1f-1a00-0000-4a09-78c8190d0000 pid=3353 execve guuid=d9c6861f-1a00-0000-4a09-78c81a0d0000 pid=3354 /usr/bin/dash guuid=f3b9f42c-1900-0000-4a09-78c8940b0000 pid=2964->guuid=d9c6861f-1a00-0000-4a09-78c81a0d0000 pid=3354 clone guuid=baf6941f-1a00-0000-4a09-78c81b0d0000 pid=3355 /usr/bin/wget net send-data write-file guuid=f3b9f42c-1900-0000-4a09-78c8940b0000 pid=2964->guuid=baf6941f-1a00-0000-4a09-78c81b0d0000 pid=3355 execve guuid=4f64f932-1a00-0000-4a09-78c8380d0000 pid=3384 /usr/bin/chmod guuid=f3b9f42c-1900-0000-4a09-78c8940b0000 pid=2964->guuid=4f64f932-1a00-0000-4a09-78c8380d0000 pid=3384 execve guuid=5c365933-1a00-0000-4a09-78c83a0d0000 pid=3386 /home/sandbox/x86 net guuid=f3b9f42c-1900-0000-4a09-78c8940b0000 pid=2964->guuid=5c365933-1a00-0000-4a09-78c83a0d0000 pid=3386 execve guuid=6fb08842-1a00-0000-4a09-78c86b0d0000 pid=3435 /usr/bin/wget net send-data write-file guuid=f3b9f42c-1900-0000-4a09-78c8940b0000 pid=2964->guuid=6fb08842-1a00-0000-4a09-78c86b0d0000 pid=3435 execve guuid=eb4db456-1a00-0000-4a09-78c8ac0d0000 pid=3500 /usr/bin/chmod guuid=f3b9f42c-1900-0000-4a09-78c8940b0000 pid=2964->guuid=eb4db456-1a00-0000-4a09-78c8ac0d0000 pid=3500 execve guuid=ae97f156-1a00-0000-4a09-78c8ae0d0000 pid=3502 /home/sandbox/x86_64 net guuid=f3b9f42c-1900-0000-4a09-78c8940b0000 pid=2964->guuid=ae97f156-1a00-0000-4a09-78c8ae0d0000 pid=3502 execve guuid=4e602366-1a00-0000-4a09-78c8d60d0000 pid=3542 /usr/bin/rm delete-file guuid=f3b9f42c-1900-0000-4a09-78c8940b0000 pid=2964->guuid=4e602366-1a00-0000-4a09-78c8d60d0000 pid=3542 execve 3be432f5-b435-5a84-bbed-10708390af3c 194.238.26.136:80 guuid=dc8a3e2d-1900-0000-4a09-78c8950b0000 pid=2965->3be432f5-b435-5a84-bbed-10708390af3c send: 141B guuid=df26a045-1900-0000-4a09-78c8ca0b0000 pid=3018->3be432f5-b435-5a84-bbed-10708390af3c send: 142B guuid=e35cac59-1900-0000-4a09-78c8fa0b0000 pid=3066->3be432f5-b435-5a84-bbed-10708390af3c send: 142B guuid=537b7075-1900-0000-4a09-78c8210c0000 pid=3105->3be432f5-b435-5a84-bbed-10708390af3c send: 142B guuid=119c1094-1900-0000-4a09-78c86a0c0000 pid=3178->3be432f5-b435-5a84-bbed-10708390af3c send: 142B guuid=138c7eaf-1900-0000-4a09-78c8860c0000 pid=3206->3be432f5-b435-5a84-bbed-10708390af3c send: 142B guuid=d01b8ecb-1900-0000-4a09-78c8a20c0000 pid=3234->3be432f5-b435-5a84-bbed-10708390af3c send: 142B guuid=5768d7e7-1900-0000-4a09-78c8bb0c0000 pid=3259->3be432f5-b435-5a84-bbed-10708390af3c send: 141B guuid=892eae04-1a00-0000-4a09-78c8d50c0000 pid=3285->3be432f5-b435-5a84-bbed-10708390af3c send: 141B guuid=b3fc5212-1a00-0000-4a09-78c8f50c0000 pid=3317->3be432f5-b435-5a84-bbed-10708390af3c send: 141B guuid=baf6941f-1a00-0000-4a09-78c81b0d0000 pid=3355->3be432f5-b435-5a84-bbed-10708390af3c send: 141B 8b0a01dc-0728-52c1-8024-c4ba7801b8d6 8.8.8.8:53 guuid=5c365933-1a00-0000-4a09-78c83a0d0000 pid=3386->8b0a01dc-0728-52c1-8024-c4ba7801b8d6 con guuid=8de57b42-1a00-0000-4a09-78c8690d0000 pid=3433 /home/sandbox/x86 guuid=5c365933-1a00-0000-4a09-78c83a0d0000 pid=3386->guuid=8de57b42-1a00-0000-4a09-78c8690d0000 pid=3433 clone guuid=48378142-1a00-0000-4a09-78c86a0d0000 pid=3434 /home/sandbox/x86 net send-data zombie guuid=5c365933-1a00-0000-4a09-78c83a0d0000 pid=3386->guuid=48378142-1a00-0000-4a09-78c86a0d0000 pid=3434 clone guuid=48378142-1a00-0000-4a09-78c86a0d0000 pid=3434->8b0a01dc-0728-52c1-8024-c4ba7801b8d6 con 741d4b50-67cd-5c90-a3da-6fb4b3d62b18 87.121.84.117:61459 guuid=48378142-1a00-0000-4a09-78c86a0d0000 pid=3434->741d4b50-67cd-5c90-a3da-6fb4b3d62b18 send: 41B guuid=6fb08842-1a00-0000-4a09-78c86b0d0000 pid=3435->3be432f5-b435-5a84-bbed-10708390af3c send: 144B guuid=ae97f156-1a00-0000-4a09-78c8ae0d0000 pid=3502->8b0a01dc-0728-52c1-8024-c4ba7801b8d6 con guuid=4db11766-1a00-0000-4a09-78c8d30d0000 pid=3539 /home/sandbox/x86_64 guuid=ae97f156-1a00-0000-4a09-78c8ae0d0000 pid=3502->guuid=4db11766-1a00-0000-4a09-78c8d30d0000 pid=3539 clone guuid=45631c66-1a00-0000-4a09-78c8d50d0000 pid=3541 /home/sandbox/x86_64 net send-data zombie guuid=ae97f156-1a00-0000-4a09-78c8ae0d0000 pid=3502->guuid=45631c66-1a00-0000-4a09-78c8d50d0000 pid=3541 clone guuid=45631c66-1a00-0000-4a09-78c8d50d0000 pid=3541->8b0a01dc-0728-52c1-8024-c4ba7801b8d6 con guuid=45631c66-1a00-0000-4a09-78c8d50d0000 pid=3541->741d4b50-67cd-5c90-a3da-6fb4b3d62b18 send: 46B
Threat name:
Linux.Trojan.Vigorf
Status:
Malicious
First seen:
2025-10-13 20:55:13 UTC
File Type:
Text (Shell)
AV detection:
17 of 38 (44.74%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Modifies registry class
Suspicious use of SetWindowsHookEx
Enumerates physical storage devices
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh 9e2c9d6298415bee8acdc22b9077799e9da9959c0600f4d1bc38ab168a1365e6

(this sample)

  
Delivery method
Distributed via web download

Comments