MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 a1d5da69e8ef3386501f1876e33f29125dbd3cfc861a386da01a69957b0f55d8. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 8


Intelligence 8 IOCs YARA 1 File information Comments

SHA256 hash: a1d5da69e8ef3386501f1876e33f29125dbd3cfc861a386da01a69957b0f55d8
SHA3-384 hash: 1070bf3a0b6fdd6626b488b8d166b661164ad6eb776f4791eb4255daa34c149fee7eaeebc32608a3c4ebb2d9e95e8dec
SHA1 hash: 79fdd892c80c3830d7ca241c659824c69eea916a
MD5 hash: 0b40c24c8c37a175ce2f229baaf5d703
humanhash: lake-single-utah-salami
File name:wget.sh
Download: download sample
Signature Mirai
File size:1'003 bytes
First seen:2026-01-13 17:32:54 UTC
Last seen:Never
File type: sh
MIME type:text/x-shellscript
ssdeep 24:EwPJrbllAENI7NPK9eIZfmI5kYlxPNtq/xmO0A3f8jv:BPtj2F3I/5AA
TLSH T1D2113BDF35D354E2958D9E0ABC790C446004C2C9F994AE36F483183B9CF67187828FD6
TrID 70.0% (.SH) Linux/UNIX shell script (7000/1)
30.0% (.) Unix-like shebang (var.3) (gen) (3000/1)
Magika shell
Reporter abuse_ch
Tags:mirai sh
URLMalware sample (SHA256 hash)SignatureTags
http://154.6.197.41/bins/arm61a4b0868ce06046999e76536bbf94a07336ec3ed3d0a8edc935d57c674fb187 Miraimirai opendir
http://154.6.197.41/bins/arm58f40d31972029c1d7f88790b7c2ec116deabafa25352aafb5b62780edaf94d6f Miraimirai opendir
http://154.6.197.41/bins/arm6491dc178d7e42e3ffd98a9977664b9a79be08dbefc9efe4531311a432d9eb70e Miraimirai opendir
http://154.6.197.41/bins/arm7b0cb456114f2fd7bdc8ee3f7a0da44ac1a673314ce90905826524f426413e13e Miraimirai opendir
http://154.6.197.41/bins/m68ke594c4dca244303ec4efcd939d95cb7108104e335c3edf85d1766bd462204180 Miraimirai opendir
http://154.6.197.41/bins/mipsf7d2afdec972e57c79775f06665e80ab7cdc8a1974f1d3002a89fb0f27a9bbae Miraimirai opendir
http://154.6.197.41/bins/mpsln/an/aua-wget
http://154.6.197.41/bins/ppc0f8d7d0e039dbb1dbdd62182a43f735b6adf887084ef3aaabf5ae29908a4822e Miraimirai opendir
http://154.6.197.41/bins/sh4bcef5d6a503c6fca15c039cc4f53e1098316a22c1f9fe29d19fc3beb5e1e4637 Miraimirai opendir
http://154.6.197.41/bins/spce868327424a6b2cacc60c09e7dca335c4bb9178b723d1fb4e57b05959b1336c3 Miraimirai opendir
http://154.6.197.41/bins/x86747a9e3bbe95b804d32fa3377d9d76a30bb46d45f6396b0357e3ec3410be0ee9 Miraimirai opendir
http://154.6.197.41/bins/x86_6422482b7fbf6dab523956888b0844cd25b065921885c59aba052e967195d3e4c1 Miraimirai opendir

Intelligence


File Origin
# of uploads :
1
# of downloads :
52
Origin country :
DE DE
Vendor Threat Intelligence
No detections
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
evasive mirai
Verdict:
Malicious
File Type:
unix shell
First seen:
2026-01-13T14:44:00Z UTC
Last seen:
2026-01-14T12:48:00Z UTC
Hits:
~10
Detections:
HEUR:Trojan-Downloader.Shell.Agent.a
Status:
terminated
Behavior Graph:
%3 guuid=ee65ad41-1a00-0000-c9e7-4d09e4090000 pid=2532 /usr/bin/sudo guuid=974faf44-1a00-0000-c9e7-4d09e8090000 pid=2536 /tmp/sample.bin guuid=ee65ad41-1a00-0000-c9e7-4d09e4090000 pid=2532->guuid=974faf44-1a00-0000-c9e7-4d09e8090000 pid=2536 execve guuid=385b3445-1a00-0000-c9e7-4d09eb090000 pid=2539 /usr/bin/wget net send-data write-file guuid=974faf44-1a00-0000-c9e7-4d09e8090000 pid=2536->guuid=385b3445-1a00-0000-c9e7-4d09eb090000 pid=2539 execve guuid=3c2c596d-1a00-0000-c9e7-4d09540a0000 pid=2644 /usr/bin/chmod guuid=974faf44-1a00-0000-c9e7-4d09e8090000 pid=2536->guuid=3c2c596d-1a00-0000-c9e7-4d09540a0000 pid=2644 execve guuid=a8d3a16d-1a00-0000-c9e7-4d09560a0000 pid=2646 /usr/bin/bash guuid=974faf44-1a00-0000-c9e7-4d09e8090000 pid=2536->guuid=a8d3a16d-1a00-0000-c9e7-4d09560a0000 pid=2646 clone guuid=ccf2266f-1a00-0000-c9e7-4d095b0a0000 pid=2651 /usr/bin/wget net send-data write-file guuid=974faf44-1a00-0000-c9e7-4d09e8090000 pid=2536->guuid=ccf2266f-1a00-0000-c9e7-4d095b0a0000 pid=2651 execve guuid=ae175a8c-1a00-0000-c9e7-4d09ad0a0000 pid=2733 /usr/bin/chmod guuid=974faf44-1a00-0000-c9e7-4d09e8090000 pid=2536->guuid=ae175a8c-1a00-0000-c9e7-4d09ad0a0000 pid=2733 execve guuid=3f08c28c-1a00-0000-c9e7-4d09af0a0000 pid=2735 /usr/bin/bash guuid=974faf44-1a00-0000-c9e7-4d09e8090000 pid=2536->guuid=3f08c28c-1a00-0000-c9e7-4d09af0a0000 pid=2735 clone guuid=6c161a8f-1a00-0000-c9e7-4d09b50a0000 pid=2741 /usr/bin/wget net send-data write-file guuid=974faf44-1a00-0000-c9e7-4d09e8090000 pid=2536->guuid=6c161a8f-1a00-0000-c9e7-4d09b50a0000 pid=2741 execve guuid=5e0f7eb2-1a00-0000-c9e7-4d09f10a0000 pid=2801 /usr/bin/chmod guuid=974faf44-1a00-0000-c9e7-4d09e8090000 pid=2536->guuid=5e0f7eb2-1a00-0000-c9e7-4d09f10a0000 pid=2801 execve guuid=4deacdb2-1a00-0000-c9e7-4d09f30a0000 pid=2803 /usr/bin/bash guuid=974faf44-1a00-0000-c9e7-4d09e8090000 pid=2536->guuid=4deacdb2-1a00-0000-c9e7-4d09f30a0000 pid=2803 clone guuid=62afe5b3-1a00-0000-c9e7-4d09f70a0000 pid=2807 /usr/bin/wget net send-data write-file guuid=974faf44-1a00-0000-c9e7-4d09e8090000 pid=2536->guuid=62afe5b3-1a00-0000-c9e7-4d09f70a0000 pid=2807 execve guuid=4a0e4be0-1a00-0000-c9e7-4d094d0b0000 pid=2893 /usr/bin/chmod guuid=974faf44-1a00-0000-c9e7-4d09e8090000 pid=2536->guuid=4a0e4be0-1a00-0000-c9e7-4d094d0b0000 pid=2893 execve guuid=d0ddb0e0-1a00-0000-c9e7-4d094f0b0000 pid=2895 /usr/bin/bash guuid=974faf44-1a00-0000-c9e7-4d09e8090000 pid=2536->guuid=d0ddb0e0-1a00-0000-c9e7-4d094f0b0000 pid=2895 clone guuid=ef9357e2-1a00-0000-c9e7-4d09530b0000 pid=2899 /usr/bin/wget net send-data write-file guuid=974faf44-1a00-0000-c9e7-4d09e8090000 pid=2536->guuid=ef9357e2-1a00-0000-c9e7-4d09530b0000 pid=2899 execve guuid=da37970f-1b00-0000-c9e7-4d099e0b0000 pid=2974 /usr/bin/chmod guuid=974faf44-1a00-0000-c9e7-4d09e8090000 pid=2536->guuid=da37970f-1b00-0000-c9e7-4d099e0b0000 pid=2974 execve guuid=339b0d10-1b00-0000-c9e7-4d099f0b0000 pid=2975 /usr/bin/bash guuid=974faf44-1a00-0000-c9e7-4d09e8090000 pid=2536->guuid=339b0d10-1b00-0000-c9e7-4d099f0b0000 pid=2975 clone guuid=9fe01511-1b00-0000-c9e7-4d09a20b0000 pid=2978 /usr/bin/wget net send-data write-file guuid=974faf44-1a00-0000-c9e7-4d09e8090000 pid=2536->guuid=9fe01511-1b00-0000-c9e7-4d09a20b0000 pid=2978 execve guuid=a9f12c36-1b00-0000-c9e7-4d09de0b0000 pid=3038 /usr/bin/chmod guuid=974faf44-1a00-0000-c9e7-4d09e8090000 pid=2536->guuid=a9f12c36-1b00-0000-c9e7-4d09de0b0000 pid=3038 execve guuid=34b6ac36-1b00-0000-c9e7-4d09e00b0000 pid=3040 /usr/bin/bash guuid=974faf44-1a00-0000-c9e7-4d09e8090000 pid=2536->guuid=34b6ac36-1b00-0000-c9e7-4d09e00b0000 pid=3040 clone guuid=8890a737-1b00-0000-c9e7-4d09e40b0000 pid=3044 /usr/bin/wget net send-data guuid=974faf44-1a00-0000-c9e7-4d09e8090000 pid=2536->guuid=8890a737-1b00-0000-c9e7-4d09e40b0000 pid=3044 execve guuid=b0623748-1b00-0000-c9e7-4d09fe0b0000 pid=3070 /usr/bin/chmod guuid=974faf44-1a00-0000-c9e7-4d09e8090000 pid=2536->guuid=b0623748-1b00-0000-c9e7-4d09fe0b0000 pid=3070 execve guuid=9b6cc548-1b00-0000-c9e7-4d09000c0000 pid=3072 /usr/bin/bash guuid=974faf44-1a00-0000-c9e7-4d09e8090000 pid=2536->guuid=9b6cc548-1b00-0000-c9e7-4d09000c0000 pid=3072 clone guuid=f078234a-1b00-0000-c9e7-4d09040c0000 pid=3076 /usr/bin/wget net send-data write-file guuid=974faf44-1a00-0000-c9e7-4d09e8090000 pid=2536->guuid=f078234a-1b00-0000-c9e7-4d09040c0000 pid=3076 execve guuid=b61e3d6f-1b00-0000-c9e7-4d09430c0000 pid=3139 /usr/bin/chmod guuid=974faf44-1a00-0000-c9e7-4d09e8090000 pid=2536->guuid=b61e3d6f-1b00-0000-c9e7-4d09430c0000 pid=3139 execve guuid=fdcbbb6f-1b00-0000-c9e7-4d09450c0000 pid=3141 /usr/bin/bash guuid=974faf44-1a00-0000-c9e7-4d09e8090000 pid=2536->guuid=fdcbbb6f-1b00-0000-c9e7-4d09450c0000 pid=3141 clone guuid=a8a76170-1b00-0000-c9e7-4d09490c0000 pid=3145 /usr/bin/wget net send-data write-file guuid=974faf44-1a00-0000-c9e7-4d09e8090000 pid=2536->guuid=a8a76170-1b00-0000-c9e7-4d09490c0000 pid=3145 execve guuid=78f99993-1b00-0000-c9e7-4d09840c0000 pid=3204 /usr/bin/chmod guuid=974faf44-1a00-0000-c9e7-4d09e8090000 pid=2536->guuid=78f99993-1b00-0000-c9e7-4d09840c0000 pid=3204 execve guuid=249aea93-1b00-0000-c9e7-4d09850c0000 pid=3205 /usr/bin/bash guuid=974faf44-1a00-0000-c9e7-4d09e8090000 pid=2536->guuid=249aea93-1b00-0000-c9e7-4d09850c0000 pid=3205 clone guuid=fdde7f94-1b00-0000-c9e7-4d09890c0000 pid=3209 /usr/bin/wget net send-data write-file guuid=974faf44-1a00-0000-c9e7-4d09e8090000 pid=2536->guuid=fdde7f94-1b00-0000-c9e7-4d09890c0000 pid=3209 execve guuid=e9c19fb8-1b00-0000-c9e7-4d09a40c0000 pid=3236 /usr/bin/chmod guuid=974faf44-1a00-0000-c9e7-4d09e8090000 pid=2536->guuid=e9c19fb8-1b00-0000-c9e7-4d09a40c0000 pid=3236 execve guuid=d954e7b8-1b00-0000-c9e7-4d09a60c0000 pid=3238 /usr/bin/bash guuid=974faf44-1a00-0000-c9e7-4d09e8090000 pid=2536->guuid=d954e7b8-1b00-0000-c9e7-4d09a60c0000 pid=3238 clone guuid=700360bb-1b00-0000-c9e7-4d09ad0c0000 pid=3245 /usr/bin/wget net send-data write-file guuid=974faf44-1a00-0000-c9e7-4d09e8090000 pid=2536->guuid=700360bb-1b00-0000-c9e7-4d09ad0c0000 pid=3245 execve guuid=6282afdd-1b00-0000-c9e7-4d09ce0c0000 pid=3278 /usr/bin/chmod guuid=974faf44-1a00-0000-c9e7-4d09e8090000 pid=2536->guuid=6282afdd-1b00-0000-c9e7-4d09ce0c0000 pid=3278 execve guuid=489b09de-1b00-0000-c9e7-4d09d00c0000 pid=3280 /home/sandbox/x86 net guuid=974faf44-1a00-0000-c9e7-4d09e8090000 pid=2536->guuid=489b09de-1b00-0000-c9e7-4d09d00c0000 pid=3280 execve guuid=0b60b455-1c00-0000-c9e7-4d099e0d0000 pid=3486 /usr/bin/wget net send-data write-file guuid=974faf44-1a00-0000-c9e7-4d09e8090000 pid=2536->guuid=0b60b455-1c00-0000-c9e7-4d099e0d0000 pid=3486 execve guuid=177fd678-1c00-0000-c9e7-4d09e00d0000 pid=3552 /usr/bin/chmod guuid=974faf44-1a00-0000-c9e7-4d09e8090000 pid=2536->guuid=177fd678-1c00-0000-c9e7-4d09e00d0000 pid=3552 execve guuid=d0041e79-1c00-0000-c9e7-4d09e20d0000 pid=3554 /home/sandbox/x86_64 net guuid=974faf44-1a00-0000-c9e7-4d09e8090000 pid=2536->guuid=d0041e79-1c00-0000-c9e7-4d09e20d0000 pid=3554 execve guuid=8a6f9df0-1c00-0000-c9e7-4d09c50e0000 pid=3781 /usr/bin/rm delete-file guuid=974faf44-1a00-0000-c9e7-4d09e8090000 pid=2536->guuid=8a6f9df0-1c00-0000-c9e7-4d09c50e0000 pid=3781 execve 7576496e-46a6-5923-9e69-9ecf454f3a43 154.6.197.41:80 guuid=385b3445-1a00-0000-c9e7-4d09eb090000 pid=2539->7576496e-46a6-5923-9e69-9ecf454f3a43 send: 135B guuid=ccf2266f-1a00-0000-c9e7-4d095b0a0000 pid=2651->7576496e-46a6-5923-9e69-9ecf454f3a43 send: 136B guuid=6c161a8f-1a00-0000-c9e7-4d09b50a0000 pid=2741->7576496e-46a6-5923-9e69-9ecf454f3a43 send: 136B guuid=62afe5b3-1a00-0000-c9e7-4d09f70a0000 pid=2807->7576496e-46a6-5923-9e69-9ecf454f3a43 send: 136B guuid=ef9357e2-1a00-0000-c9e7-4d09530b0000 pid=2899->7576496e-46a6-5923-9e69-9ecf454f3a43 send: 136B guuid=9fe01511-1b00-0000-c9e7-4d09a20b0000 pid=2978->7576496e-46a6-5923-9e69-9ecf454f3a43 send: 136B guuid=8890a737-1b00-0000-c9e7-4d09e40b0000 pid=3044->7576496e-46a6-5923-9e69-9ecf454f3a43 send: 136B guuid=f078234a-1b00-0000-c9e7-4d09040c0000 pid=3076->7576496e-46a6-5923-9e69-9ecf454f3a43 send: 135B guuid=a8a76170-1b00-0000-c9e7-4d09490c0000 pid=3145->7576496e-46a6-5923-9e69-9ecf454f3a43 send: 135B guuid=fdde7f94-1b00-0000-c9e7-4d09890c0000 pid=3209->7576496e-46a6-5923-9e69-9ecf454f3a43 send: 135B guuid=700360bb-1b00-0000-c9e7-4d09ad0c0000 pid=3245->7576496e-46a6-5923-9e69-9ecf454f3a43 send: 135B 8b0a01dc-0728-52c1-8024-c4ba7801b8d6 8.8.8.8:53 guuid=489b09de-1b00-0000-c9e7-4d09d00c0000 pid=3280->8b0a01dc-0728-52c1-8024-c4ba7801b8d6 con guuid=45aa41de-1b00-0000-c9e7-4d09d10c0000 pid=3281 /home/sandbox/x86 guuid=489b09de-1b00-0000-c9e7-4d09d00c0000 pid=3280->guuid=45aa41de-1b00-0000-c9e7-4d09d10c0000 pid=3281 clone guuid=9921eb19-1c00-0000-c9e7-4d093b0d0000 pid=3387 /home/sandbox/x86 guuid=489b09de-1b00-0000-c9e7-4d09d00c0000 pid=3280->guuid=9921eb19-1c00-0000-c9e7-4d093b0d0000 pid=3387 clone guuid=f20a9a55-1c00-0000-c9e7-4d099b0d0000 pid=3483 /home/sandbox/x86 guuid=489b09de-1b00-0000-c9e7-4d09d00c0000 pid=3280->guuid=f20a9a55-1c00-0000-c9e7-4d099b0d0000 pid=3483 clone guuid=186da155-1c00-0000-c9e7-4d099d0d0000 pid=3485 /home/sandbox/x86 net send-data zombie guuid=489b09de-1b00-0000-c9e7-4d09d00c0000 pid=3280->guuid=186da155-1c00-0000-c9e7-4d099d0d0000 pid=3485 clone guuid=186da155-1c00-0000-c9e7-4d099d0d0000 pid=3485->8b0a01dc-0728-52c1-8024-c4ba7801b8d6 con fd958c44-b210-5a3a-a4ef-274c9c988eca 154.6.197.41:1999 guuid=186da155-1c00-0000-c9e7-4d099d0d0000 pid=3485->fd958c44-b210-5a3a-a4ef-274c9c988eca send: 168B guuid=0b60b455-1c00-0000-c9e7-4d099e0d0000 pid=3486->7576496e-46a6-5923-9e69-9ecf454f3a43 send: 138B guuid=d0041e79-1c00-0000-c9e7-4d09e20d0000 pid=3554->8b0a01dc-0728-52c1-8024-c4ba7801b8d6 con guuid=9d323d79-1c00-0000-c9e7-4d09e30d0000 pid=3555 /home/sandbox/x86_64 guuid=d0041e79-1c00-0000-c9e7-4d09e20d0000 pid=3554->guuid=9d323d79-1c00-0000-c9e7-4d09e30d0000 pid=3555 clone guuid=52c5e2b4-1c00-0000-c9e7-4d094b0e0000 pid=3659 /home/sandbox/x86_64 guuid=d0041e79-1c00-0000-c9e7-4d09e20d0000 pid=3554->guuid=52c5e2b4-1c00-0000-c9e7-4d094b0e0000 pid=3659 clone guuid=2d588af0-1c00-0000-c9e7-4d09c30e0000 pid=3779 /home/sandbox/x86_64 guuid=d0041e79-1c00-0000-c9e7-4d09e20d0000 pid=3554->guuid=2d588af0-1c00-0000-c9e7-4d09c30e0000 pid=3779 clone guuid=bfcb8ef0-1c00-0000-c9e7-4d09c40e0000 pid=3780 /home/sandbox/x86_64 net send-data zombie guuid=d0041e79-1c00-0000-c9e7-4d09e20d0000 pid=3554->guuid=bfcb8ef0-1c00-0000-c9e7-4d09c40e0000 pid=3780 clone guuid=bfcb8ef0-1c00-0000-c9e7-4d09c40e0000 pid=3780->8b0a01dc-0728-52c1-8024-c4ba7801b8d6 con guuid=bfcb8ef0-1c00-0000-c9e7-4d09c40e0000 pid=3780->fd958c44-b210-5a3a-a4ef-274c9c988eca send: 231B
Threat name:
Win32.Trojan.Vigorf
Status:
Malicious
First seen:
2026-01-13 17:35:47 UTC
File Type:
Text (Shell)
AV detection:
9 of 24 (37.50%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:mirai botnet:owari botnet defense_evasion discovery linux
Behaviour
System Network Configuration Discovery
Writes file to tmp directory
Changes its process name
Reads system network configuration
Enumerates active TCP sockets
File and Directory Permissions Modification
Executes dropped EXE
Modifies Watchdog functionality
Mirai
Mirai family
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:MAL_Linux_IoT_MultiArch_BotnetLoader_Generic
Author:Anish Bogati
Description:Technique-based detection of IoT/Linux botnet loader shell scripts downloading binaries from numeric IPs, chmodding, and executing multi-architecture payloads
Reference:MalwareBazaar sample lilin.sh

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh a1d5da69e8ef3386501f1876e33f29125dbd3cfc861a386da01a69957b0f55d8

(this sample)

  
Delivery method
Distributed via web download

Comments