MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 9e4f6ecd3c5416e21f901fdf8b9f0c6e213fc3e500472c63cb1309a43162d290. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 5


Intelligence 5 IOCs YARA 1 File information Comments

SHA256 hash: 9e4f6ecd3c5416e21f901fdf8b9f0c6e213fc3e500472c63cb1309a43162d290
SHA3-384 hash: 37feaafaabcfa8b8b9a247266eb906e6e6b798a8663f05a5f4429fb916c90d8abc3828e5128aec334c408651ae2d3a11
SHA1 hash: dd5f69b7d8c1b9a65ea1d8f4bffbb247a2ad02ec
MD5 hash: 24237e8c6c523a0632bf228f6d49152c
humanhash: video-echo-december-indigo
File name:wget.sh
Download: download sample
Signature Mirai
File size:860 bytes
First seen:2025-06-27 05:15:03 UTC
Last seen:2025-06-28 03:21:24 UTC
File type: sh
MIME type:text/plain
ssdeep 24:PhtURUKJUSNI7PUqKOUSBU9U0qU4tJUAU4qhuu:Phem5qNhuu
TLSH T13E11949F14707C9649799E2F72738618701C96CEA96B8F88AC4F587E8DC77083418F05
Magika shell
Reporter abuse_ch
Tags:mirai sh
URLMalware sample (SHA256 hash)SignatureTags
http://185.208.158.140/arm8271f1f986b352fff15ea4a77cc5fec53c1d9dcca742d4a9c9d2ab6891eab18a Miraielf gafgyt mirai ua-wget
http://185.208.158.140/arm5575ef1a01819dd1f1c2c0fb09b0001725599230fc4ce03d197b52751ff85a341 Miraielf mirai ua-wget
http://185.208.158.140/arm66402c8ac9e7bcc47f493ed249ef2b5a0e1b0b317e0dbd8012b61d3507c67fd0e Miraielf mirai ua-wget
http://185.208.158.140/arm737d405a2afcd051f24faa7d536ac292e28148575a2ee02766b92046f413a3c57 Miraielf mirai ua-wget
http://185.208.158.140/mips7b02048872ec82be36a7a9c28d8479a1c884a2df339416c822554211e6d5b05e Miraielf gafgyt mirai ua-wget
http://185.208.158.140/mipself0c4dc9e697cc34437766c67140cc210be04bd62997bf2ace3c389e3d9e32ff7 Miraielf mirai ua-wget
http://185.208.158.140/powerpccefd6e28cd1c138a151a1721dbbe1a53b410424b259179faa792fcc8063952ba Miraielf mirai ua-wget
http://185.208.158.140/sh4dfc72b2b40890a9747c242f69db7c4941794bf89c5ff0ef75dab6e1338c6cd6f Miraielf mirai ua-wget
http://185.208.158.140/sparc36eb14fd17bd36eb37ce29bdffe3109b88ffef2387f94647593d267b3214b134 Miraielf mirai ua-wget
http://185.208.158.140/x86_641d9f46542a855257b2a801c72449db0482435d1bb05cffccc0ad56a82e4631e6 Miraielf mirai ua-wget

Intelligence


File Origin
# of uploads :
2
# of downloads :
71
Origin country :
DE DE
Vendor Threat Intelligence
Status:
terminated
Behavior Graph:
%3 guuid=1ac246a4-1700-0000-5ab5-c6655d0c0000 pid=3165 /usr/bin/sudo guuid=2ea762a6-1700-0000-5ab5-c6655f0c0000 pid=3167 /tmp/sample.bin guuid=1ac246a4-1700-0000-5ab5-c6655d0c0000 pid=3165->guuid=2ea762a6-1700-0000-5ab5-c6655f0c0000 pid=3167 execve guuid=accda2a6-1700-0000-5ab5-c665600c0000 pid=3168 /usr/bin/rm guuid=2ea762a6-1700-0000-5ab5-c6655f0c0000 pid=3167->guuid=accda2a6-1700-0000-5ab5-c665600c0000 pid=3168 execve guuid=1c0ce8a6-1700-0000-5ab5-c665610c0000 pid=3169 /usr/bin/rm guuid=2ea762a6-1700-0000-5ab5-c6655f0c0000 pid=3167->guuid=1c0ce8a6-1700-0000-5ab5-c665610c0000 pid=3169 execve guuid=de9d26a7-1700-0000-5ab5-c665620c0000 pid=3170 /usr/bin/rm guuid=2ea762a6-1700-0000-5ab5-c6655f0c0000 pid=3167->guuid=de9d26a7-1700-0000-5ab5-c665620c0000 pid=3170 execve guuid=728f60a7-1700-0000-5ab5-c665640c0000 pid=3172 /usr/bin/rm guuid=2ea762a6-1700-0000-5ab5-c6655f0c0000 pid=3167->guuid=728f60a7-1700-0000-5ab5-c665640c0000 pid=3172 execve guuid=56899ca7-1700-0000-5ab5-c665660c0000 pid=3174 /usr/bin/rm guuid=2ea762a6-1700-0000-5ab5-c6655f0c0000 pid=3167->guuid=56899ca7-1700-0000-5ab5-c665660c0000 pid=3174 execve guuid=dd54d7a7-1700-0000-5ab5-c665670c0000 pid=3175 /usr/bin/rm guuid=2ea762a6-1700-0000-5ab5-c6655f0c0000 pid=3167->guuid=dd54d7a7-1700-0000-5ab5-c665670c0000 pid=3175 execve guuid=224b06a8-1700-0000-5ab5-c665690c0000 pid=3177 /usr/bin/rm guuid=2ea762a6-1700-0000-5ab5-c6655f0c0000 pid=3167->guuid=224b06a8-1700-0000-5ab5-c665690c0000 pid=3177 execve guuid=c39b3fa8-1700-0000-5ab5-c6656b0c0000 pid=3179 /usr/bin/wget net send-data write-file guuid=2ea762a6-1700-0000-5ab5-c6655f0c0000 pid=3167->guuid=c39b3fa8-1700-0000-5ab5-c6656b0c0000 pid=3179 execve guuid=5e49e2b0-1700-0000-5ab5-c665810c0000 pid=3201 /usr/bin/chmod guuid=2ea762a6-1700-0000-5ab5-c6655f0c0000 pid=3167->guuid=5e49e2b0-1700-0000-5ab5-c665810c0000 pid=3201 execve guuid=dee729b1-1700-0000-5ab5-c665830c0000 pid=3203 /usr/bin/dash guuid=2ea762a6-1700-0000-5ab5-c6655f0c0000 pid=3167->guuid=dee729b1-1700-0000-5ab5-c665830c0000 pid=3203 clone guuid=f8d2b0b1-1700-0000-5ab5-c665860c0000 pid=3206 /usr/bin/wget net send-data write-file guuid=2ea762a6-1700-0000-5ab5-c6655f0c0000 pid=3167->guuid=f8d2b0b1-1700-0000-5ab5-c665860c0000 pid=3206 execve guuid=225884b8-1700-0000-5ab5-c6658f0c0000 pid=3215 /usr/bin/chmod guuid=2ea762a6-1700-0000-5ab5-c6655f0c0000 pid=3167->guuid=225884b8-1700-0000-5ab5-c6658f0c0000 pid=3215 execve guuid=b60fd4b8-1700-0000-5ab5-c665900c0000 pid=3216 /usr/bin/dash guuid=2ea762a6-1700-0000-5ab5-c6655f0c0000 pid=3167->guuid=b60fd4b8-1700-0000-5ab5-c665900c0000 pid=3216 clone guuid=34df84b9-1700-0000-5ab5-c665920c0000 pid=3218 /usr/bin/wget net send-data write-file guuid=2ea762a6-1700-0000-5ab5-c6655f0c0000 pid=3167->guuid=34df84b9-1700-0000-5ab5-c665920c0000 pid=3218 execve guuid=f05198c0-1700-0000-5ab5-c665930c0000 pid=3219 /usr/bin/chmod guuid=2ea762a6-1700-0000-5ab5-c6655f0c0000 pid=3167->guuid=f05198c0-1700-0000-5ab5-c665930c0000 pid=3219 execve guuid=4fd3e9c0-1700-0000-5ab5-c665940c0000 pid=3220 /usr/bin/dash guuid=2ea762a6-1700-0000-5ab5-c6655f0c0000 pid=3167->guuid=4fd3e9c0-1700-0000-5ab5-c665940c0000 pid=3220 clone guuid=9eec92c1-1700-0000-5ab5-c665960c0000 pid=3222 /usr/bin/wget net send-data write-file guuid=2ea762a6-1700-0000-5ab5-c6655f0c0000 pid=3167->guuid=9eec92c1-1700-0000-5ab5-c665960c0000 pid=3222 execve guuid=e117eac9-1700-0000-5ab5-c665970c0000 pid=3223 /usr/bin/chmod guuid=2ea762a6-1700-0000-5ab5-c6655f0c0000 pid=3167->guuid=e117eac9-1700-0000-5ab5-c665970c0000 pid=3223 execve guuid=5da52eca-1700-0000-5ab5-c665990c0000 pid=3225 /usr/bin/dash guuid=2ea762a6-1700-0000-5ab5-c6655f0c0000 pid=3167->guuid=5da52eca-1700-0000-5ab5-c665990c0000 pid=3225 clone guuid=ee63caca-1700-0000-5ab5-c6659b0c0000 pid=3227 /usr/bin/wget net send-data write-file guuid=2ea762a6-1700-0000-5ab5-c6655f0c0000 pid=3167->guuid=ee63caca-1700-0000-5ab5-c6659b0c0000 pid=3227 execve guuid=70b155d3-1700-0000-5ab5-c665ab0c0000 pid=3243 /usr/bin/chmod guuid=2ea762a6-1700-0000-5ab5-c6655f0c0000 pid=3167->guuid=70b155d3-1700-0000-5ab5-c665ab0c0000 pid=3243 execve guuid=096ba2d3-1700-0000-5ab5-c665ad0c0000 pid=3245 /usr/bin/dash guuid=2ea762a6-1700-0000-5ab5-c6655f0c0000 pid=3167->guuid=096ba2d3-1700-0000-5ab5-c665ad0c0000 pid=3245 clone guuid=24af6cd5-1700-0000-5ab5-c665b30c0000 pid=3251 /usr/bin/wget net send-data write-file guuid=2ea762a6-1700-0000-5ab5-c6655f0c0000 pid=3167->guuid=24af6cd5-1700-0000-5ab5-c665b30c0000 pid=3251 execve guuid=b8e8b1dd-1700-0000-5ab5-c665b90c0000 pid=3257 /usr/bin/chmod guuid=2ea762a6-1700-0000-5ab5-c6655f0c0000 pid=3167->guuid=b8e8b1dd-1700-0000-5ab5-c665b90c0000 pid=3257 execve guuid=9675f1dd-1700-0000-5ab5-c665bb0c0000 pid=3259 /usr/bin/dash guuid=2ea762a6-1700-0000-5ab5-c6655f0c0000 pid=3167->guuid=9675f1dd-1700-0000-5ab5-c665bb0c0000 pid=3259 clone guuid=49547ede-1700-0000-5ab5-c665be0c0000 pid=3262 /usr/bin/wget net send-data guuid=2ea762a6-1700-0000-5ab5-c6655f0c0000 pid=3167->guuid=49547ede-1700-0000-5ab5-c665be0c0000 pid=3262 execve guuid=6456a8e3-1700-0000-5ab5-c665c80c0000 pid=3272 /usr/bin/chmod guuid=2ea762a6-1700-0000-5ab5-c6655f0c0000 pid=3167->guuid=6456a8e3-1700-0000-5ab5-c665c80c0000 pid=3272 execve guuid=b341f3e3-1700-0000-5ab5-c665c90c0000 pid=3273 /usr/bin/dash guuid=2ea762a6-1700-0000-5ab5-c6655f0c0000 pid=3167->guuid=b341f3e3-1700-0000-5ab5-c665c90c0000 pid=3273 clone guuid=69ee0ce4-1700-0000-5ab5-c665cb0c0000 pid=3275 /usr/bin/wget net send-data write-file guuid=2ea762a6-1700-0000-5ab5-c6655f0c0000 pid=3167->guuid=69ee0ce4-1700-0000-5ab5-c665cb0c0000 pid=3275 execve guuid=ff621beb-1700-0000-5ab5-c665d20c0000 pid=3282 /usr/bin/chmod guuid=2ea762a6-1700-0000-5ab5-c6655f0c0000 pid=3167->guuid=ff621beb-1700-0000-5ab5-c665d20c0000 pid=3282 execve guuid=0da664eb-1700-0000-5ab5-c665d40c0000 pid=3284 /usr/bin/dash guuid=2ea762a6-1700-0000-5ab5-c6655f0c0000 pid=3167->guuid=0da664eb-1700-0000-5ab5-c665d40c0000 pid=3284 clone guuid=5a1302ec-1700-0000-5ab5-c665d80c0000 pid=3288 /usr/bin/wget net send-data guuid=2ea762a6-1700-0000-5ab5-c6655f0c0000 pid=3167->guuid=5a1302ec-1700-0000-5ab5-c665d80c0000 pid=3288 execve guuid=d755ddef-1700-0000-5ab5-c665e60c0000 pid=3302 /usr/bin/chmod guuid=2ea762a6-1700-0000-5ab5-c6655f0c0000 pid=3167->guuid=d755ddef-1700-0000-5ab5-c665e60c0000 pid=3302 execve guuid=b1bb1af0-1700-0000-5ab5-c665e70c0000 pid=3303 /usr/bin/dash guuid=2ea762a6-1700-0000-5ab5-c6655f0c0000 pid=3167->guuid=b1bb1af0-1700-0000-5ab5-c665e70c0000 pid=3303 clone guuid=b4b720f0-1700-0000-5ab5-c665e80c0000 pid=3304 /usr/bin/wget net send-data write-file guuid=2ea762a6-1700-0000-5ab5-c6655f0c0000 pid=3167->guuid=b4b720f0-1700-0000-5ab5-c665e80c0000 pid=3304 execve guuid=f216eff6-1700-0000-5ab5-c665f70c0000 pid=3319 /usr/bin/chmod guuid=2ea762a6-1700-0000-5ab5-c6655f0c0000 pid=3167->guuid=f216eff6-1700-0000-5ab5-c665f70c0000 pid=3319 execve guuid=2da856f7-1700-0000-5ab5-c665f90c0000 pid=3321 /home/sandbox/x86_64 net guuid=2ea762a6-1700-0000-5ab5-c6655f0c0000 pid=3167->guuid=2da856f7-1700-0000-5ab5-c665f90c0000 pid=3321 execve guuid=50d186f7-1700-0000-5ab5-c665fc0c0000 pid=3324 /usr/bin/rm delete-file guuid=2ea762a6-1700-0000-5ab5-c6655f0c0000 pid=3167->guuid=50d186f7-1700-0000-5ab5-c665fc0c0000 pid=3324 execve guuid=f2791ff8-1700-0000-5ab5-c665000d0000 pid=3328 /usr/bin/rm delete-file guuid=2ea762a6-1700-0000-5ab5-c6655f0c0000 pid=3167->guuid=f2791ff8-1700-0000-5ab5-c665000d0000 pid=3328 execve guuid=8a14bcf8-1700-0000-5ab5-c665030d0000 pid=3331 /usr/bin/rm delete-file guuid=2ea762a6-1700-0000-5ab5-c6655f0c0000 pid=3167->guuid=8a14bcf8-1700-0000-5ab5-c665030d0000 pid=3331 execve guuid=2c1402f9-1700-0000-5ab5-c665050d0000 pid=3333 /usr/bin/rm guuid=2ea762a6-1700-0000-5ab5-c6655f0c0000 pid=3167->guuid=2c1402f9-1700-0000-5ab5-c665050d0000 pid=3333 execve guuid=ffb614fa-1700-0000-5ab5-c665070d0000 pid=3335 /usr/bin/rm delete-file guuid=2ea762a6-1700-0000-5ab5-c6655f0c0000 pid=3167->guuid=ffb614fa-1700-0000-5ab5-c665070d0000 pid=3335 execve guuid=1e09a2fa-1700-0000-5ab5-c665080d0000 pid=3336 /usr/bin/rm guuid=2ea762a6-1700-0000-5ab5-c6655f0c0000 pid=3167->guuid=1e09a2fa-1700-0000-5ab5-c665080d0000 pid=3336 execve guuid=b2e8d7fa-1700-0000-5ab5-c665090d0000 pid=3337 /usr/bin/rm delete-file guuid=2ea762a6-1700-0000-5ab5-c6655f0c0000 pid=3167->guuid=b2e8d7fa-1700-0000-5ab5-c665090d0000 pid=3337 execve guuid=f17c13fb-1700-0000-5ab5-c6650a0d0000 pid=3338 /usr/bin/rm guuid=2ea762a6-1700-0000-5ab5-c6655f0c0000 pid=3167->guuid=f17c13fb-1700-0000-5ab5-c6650a0d0000 pid=3338 execve d7a8a074-3c0d-5bba-86a5-987a33f76043 185.208.158.140:80 guuid=c39b3fa8-1700-0000-5ab5-c6656b0c0000 pid=3179->d7a8a074-3c0d-5bba-86a5-987a33f76043 send: 133B guuid=f8d2b0b1-1700-0000-5ab5-c665860c0000 pid=3206->d7a8a074-3c0d-5bba-86a5-987a33f76043 send: 134B guuid=34df84b9-1700-0000-5ab5-c665920c0000 pid=3218->d7a8a074-3c0d-5bba-86a5-987a33f76043 send: 134B guuid=9eec92c1-1700-0000-5ab5-c665960c0000 pid=3222->d7a8a074-3c0d-5bba-86a5-987a33f76043 send: 134B guuid=ee63caca-1700-0000-5ab5-c6659b0c0000 pid=3227->d7a8a074-3c0d-5bba-86a5-987a33f76043 send: 134B guuid=24af6cd5-1700-0000-5ab5-c665b30c0000 pid=3251->d7a8a074-3c0d-5bba-86a5-987a33f76043 send: 136B guuid=49547ede-1700-0000-5ab5-c665be0c0000 pid=3262->d7a8a074-3c0d-5bba-86a5-987a33f76043 send: 137B guuid=69ee0ce4-1700-0000-5ab5-c665cb0c0000 pid=3275->d7a8a074-3c0d-5bba-86a5-987a33f76043 send: 133B guuid=5a1302ec-1700-0000-5ab5-c665d80c0000 pid=3288->d7a8a074-3c0d-5bba-86a5-987a33f76043 send: 135B guuid=b4b720f0-1700-0000-5ab5-c665e80c0000 pid=3304->d7a8a074-3c0d-5bba-86a5-987a33f76043 send: 136B 8b0a01dc-0728-52c1-8024-c4ba7801b8d6 8.8.8.8:53 guuid=2da856f7-1700-0000-5ab5-c665f90c0000 pid=3321->8b0a01dc-0728-52c1-8024-c4ba7801b8d6 con guuid=867a72f7-1700-0000-5ab5-c665fa0c0000 pid=3322 /home/sandbox/x86_64 dns net send-data zombie guuid=2da856f7-1700-0000-5ab5-c665f90c0000 pid=3321->guuid=867a72f7-1700-0000-5ab5-c665fa0c0000 pid=3322 clone guuid=867a72f7-1700-0000-5ab5-c665fa0c0000 pid=3322->8b0a01dc-0728-52c1-8024-c4ba7801b8d6 send: 29B 41eddc72-81b4-5704-b6ae-07075042401d bot.vac.lol:38241 guuid=867a72f7-1700-0000-5ab5-c665fa0c0000 pid=3322->41eddc72-81b4-5704-b6ae-07075042401d send: 14B guuid=cdd581f7-1700-0000-5ab5-c665fb0c0000 pid=3323 /home/sandbox/x86_64 guuid=867a72f7-1700-0000-5ab5-c665fa0c0000 pid=3322->guuid=cdd581f7-1700-0000-5ab5-c665fb0c0000 pid=3323 clone guuid=d4f188f7-1700-0000-5ab5-c665fd0c0000 pid=3325 /home/sandbox/x86_64 net net-scan send-data guuid=867a72f7-1700-0000-5ab5-c665fa0c0000 pid=3322->guuid=d4f188f7-1700-0000-5ab5-c665fd0c0000 pid=3325 clone guuid=b5e08cf7-1700-0000-5ab5-c665fe0c0000 pid=3326 /home/sandbox/x86_64 net net-scan send-data guuid=867a72f7-1700-0000-5ab5-c665fa0c0000 pid=3322->guuid=b5e08cf7-1700-0000-5ab5-c665fe0c0000 pid=3326 clone guuid=d4f188f7-1700-0000-5ab5-c665fd0c0000 pid=3325->8b0a01dc-0728-52c1-8024-c4ba7801b8d6 con guuid=d4f188f7-1700-0000-5ab5-c665fd0c0000 pid=3325|send-data send-data to 4097 IP addresses review logs to see them all guuid=d4f188f7-1700-0000-5ab5-c665fd0c0000 pid=3325->guuid=d4f188f7-1700-0000-5ab5-c665fd0c0000 pid=3325|send-data send guuid=b5e08cf7-1700-0000-5ab5-c665fe0c0000 pid=3326->8b0a01dc-0728-52c1-8024-c4ba7801b8d6 con 77699bde-1420-5387-9d12-3986686468e6 190.13.163.92:23 guuid=b5e08cf7-1700-0000-5ab5-c665fe0c0000 pid=3326->77699bde-1420-5387-9d12-3986686468e6 send: 40B guuid=b5e08cf7-1700-0000-5ab5-c665fe0c0000 pid=3326|send-data send-data to 4097 IP addresses review logs to see them all guuid=b5e08cf7-1700-0000-5ab5-c665fe0c0000 pid=3326->guuid=b5e08cf7-1700-0000-5ab5-c665fe0c0000 pid=3326|send-data send
Threat name:
Script-Shell.Worm.Mirai
Status:
Malicious
First seen:
2025-06-27 05:15:28 UTC
File Type:
Text (Shell)
AV detection:
16 of 24 (66.67%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Modifies registry class
Suspicious use of SetWindowsHookEx
Enumerates physical storage devices
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:ach_202412_suspect_bash_script
Author:abuse.ch
Description:Detects suspicious Linux bash scripts

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh 9e4f6ecd3c5416e21f901fdf8b9f0c6e213fc3e500472c63cb1309a43162d290

(this sample)

19da04015acaedbae56e0a3ffa9e7f848c0a287d6307e23c898c7a5ff4b9af84

  
Delivery method
Distributed via web download
  
Dropping
MD5 357b1387f396bfcc83dde25158b6ce8b
  
Dropping
SHA256 19da04015acaedbae56e0a3ffa9e7f848c0a287d6307e23c898c7a5ff4b9af84

Comments