MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 a290473152a45a20cfb20cc2633006e3419509c92144ae5ce2a05fc86331022e. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: a290473152a45a20cfb20cc2633006e3419509c92144ae5ce2a05fc86331022e
SHA3-384 hash: f1d813455b4c2485a4c9952fd960111103cf6e790d43908a785034b405e162c02f35914ca3584839524d8149443ef777
SHA1 hash: 89f5ff3bef2c49c93f074429feacd0097672343b
MD5 hash: bb556427b6edf91cdeb32fc2a3e2f922
humanhash: six-angel-march-papa
File name:wget.sh
Download: download sample
Signature Mirai
File size:842 bytes
First seen:2025-12-16 07:53:49 UTC
Last seen:Never
File type: sh
MIME type:text/x-shellscript
ssdeep 12:KSs6wZj8BpFej8B8NyHe0fj8Btswj8B/SYeJB/j8BgpLj8Bwynj8BL:KSKZjzR67wsUSeLHpH/yjk
TLSH T131014CCD1280676986CCCF0BF7934A6E24454ACF4A891BC93DCD547793C4AE4F014E5A
TrID 70.0% (.SH) Linux/UNIX shell script (7000/1)
30.0% (.) Unix-like shebang (var.3) (gen) (3000/1)
Magika shell
Reporter abuse_ch
Tags:sh
URLMalware sample (SHA256 hash)SignatureTags
http://103.146.23.241/arm45168bc663329c3b1d883b83a59fe84f08b6e01895c37144ddfa9156bea3eaee Mirai32-bit elf mirai Mozi
http://103.146.23.241/arm5c081b0cb0bf6317b1c5a57c3c6c821afc9656185960865bece92b13f5da8817a Miraielf mirai ua-wget
http://103.146.23.241/arm725d009b54cc805f0e3f69e011da81239bfb6422877c1574d62e0fbc988eab49a Miraielf mirai ua-wget
http://103.146.23.241/mipsa04ede576aa16c227ad500289a8c66fdd19fdbff2697ece9a24705418b42b9e0 Mirai32-bit elf mirai Mozi
http://103.146.23.241/mpsl25f528c64b08f744661e0a347d6f8152fa9b76e2f62f42c2351539186cc1dcde Gafgytelf gafgyt mirai ua-wget
http://103.146.23.241/arcb6ee760b9fbfe272a0013850886a8e4e0b4fd824fb44b2a038ce187e8126dece Miraielf gafgyt mirai ua-wget
http://103.146.23.241/aarch6469008b5e7815c51d3b6d26bb29ebdd82057ee1c853b0368111bd47a3f145ba5f Miraielf mirai ua-wget

Intelligence


File Origin
# of uploads :
1
# of downloads :
39
Origin country :
DE DE
Vendor Threat Intelligence
No detections
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
busybox expand lolbin
Verdict:
Malicious
File Type:
unix shell
First seen:
2025-12-16T05:12:00Z UTC
Last seen:
2025-12-16T18:02:00Z UTC
Hits:
~10
Detections:
HEUR:Trojan-Downloader.Shell.Agent.p
Status:
terminated
Behavior Graph:
%3 guuid=942572fc-1800-0000-23ca-4c10240d0000 pid=3364 /usr/bin/sudo guuid=ee650ffe-1800-0000-23ca-4c10290d0000 pid=3369 /tmp/sample.bin guuid=942572fc-1800-0000-23ca-4c10240d0000 pid=3364->guuid=ee650ffe-1800-0000-23ca-4c10290d0000 pid=3369 execve guuid=2e3a40fe-1800-0000-23ca-4c102a0d0000 pid=3370 /usr/bin/rm guuid=ee650ffe-1800-0000-23ca-4c10290d0000 pid=3369->guuid=2e3a40fe-1800-0000-23ca-4c102a0d0000 pid=3370 execve guuid=70c47ffe-1800-0000-23ca-4c102c0d0000 pid=3372 /usr/bin/rm guuid=ee650ffe-1800-0000-23ca-4c10290d0000 pid=3369->guuid=70c47ffe-1800-0000-23ca-4c102c0d0000 pid=3372 execve guuid=d322b8fe-1800-0000-23ca-4c102d0d0000 pid=3373 /usr/bin/rm guuid=ee650ffe-1800-0000-23ca-4c10290d0000 pid=3369->guuid=d322b8fe-1800-0000-23ca-4c102d0d0000 pid=3373 execve guuid=6b5af0fe-1800-0000-23ca-4c102e0d0000 pid=3374 /usr/bin/rm guuid=ee650ffe-1800-0000-23ca-4c10290d0000 pid=3369->guuid=6b5af0fe-1800-0000-23ca-4c102e0d0000 pid=3374 execve guuid=03302cff-1800-0000-23ca-4c102f0d0000 pid=3375 /usr/bin/rm guuid=ee650ffe-1800-0000-23ca-4c10290d0000 pid=3369->guuid=03302cff-1800-0000-23ca-4c102f0d0000 pid=3375 execve guuid=922e63ff-1800-0000-23ca-4c10310d0000 pid=3377 /usr/bin/rm guuid=ee650ffe-1800-0000-23ca-4c10290d0000 pid=3369->guuid=922e63ff-1800-0000-23ca-4c10310d0000 pid=3377 execve guuid=01aaafff-1800-0000-23ca-4c10330d0000 pid=3379 /usr/bin/rm guuid=ee650ffe-1800-0000-23ca-4c10290d0000 pid=3369->guuid=01aaafff-1800-0000-23ca-4c10330d0000 pid=3379 execve guuid=b21ef6ff-1800-0000-23ca-4c10350d0000 pid=3381 /usr/bin/cp guuid=ee650ffe-1800-0000-23ca-4c10290d0000 pid=3369->guuid=b21ef6ff-1800-0000-23ca-4c10350d0000 pid=3381 execve guuid=43b28603-1900-0000-23ca-4c10400d0000 pid=3392 /usr/bin/busybox net send-data write-file guuid=ee650ffe-1800-0000-23ca-4c10290d0000 pid=3369->guuid=43b28603-1900-0000-23ca-4c10400d0000 pid=3392 execve guuid=924a9844-1900-0000-23ca-4c10b20d0000 pid=3506 /usr/bin/chmod guuid=ee650ffe-1800-0000-23ca-4c10290d0000 pid=3369->guuid=924a9844-1900-0000-23ca-4c10b20d0000 pid=3506 execve guuid=8d5e0b45-1900-0000-23ca-4c10b40d0000 pid=3508 /usr/bin/dash guuid=ee650ffe-1800-0000-23ca-4c10290d0000 pid=3369->guuid=8d5e0b45-1900-0000-23ca-4c10b40d0000 pid=3508 clone guuid=ed770847-1900-0000-23ca-4c10b90d0000 pid=3513 /usr/bin/busybox net send-data write-file guuid=ee650ffe-1800-0000-23ca-4c10290d0000 pid=3369->guuid=ed770847-1900-0000-23ca-4c10b90d0000 pid=3513 execve guuid=35126a89-1900-0000-23ca-4c10090e0000 pid=3593 /usr/bin/chmod guuid=ee650ffe-1800-0000-23ca-4c10290d0000 pid=3369->guuid=35126a89-1900-0000-23ca-4c10090e0000 pid=3593 execve guuid=901df889-1900-0000-23ca-4c100c0e0000 pid=3596 /usr/bin/dash guuid=ee650ffe-1800-0000-23ca-4c10290d0000 pid=3369->guuid=901df889-1900-0000-23ca-4c100c0e0000 pid=3596 clone guuid=691e608c-1900-0000-23ca-4c10110e0000 pid=3601 /usr/bin/busybox net send-data write-file guuid=ee650ffe-1800-0000-23ca-4c10290d0000 pid=3369->guuid=691e608c-1900-0000-23ca-4c10110e0000 pid=3601 execve guuid=4e670ace-1900-0000-23ca-4c10820e0000 pid=3714 /usr/bin/chmod guuid=ee650ffe-1800-0000-23ca-4c10290d0000 pid=3369->guuid=4e670ace-1900-0000-23ca-4c10820e0000 pid=3714 execve guuid=5cb451ce-1900-0000-23ca-4c10840e0000 pid=3716 /usr/bin/dash guuid=ee650ffe-1800-0000-23ca-4c10290d0000 pid=3369->guuid=5cb451ce-1900-0000-23ca-4c10840e0000 pid=3716 clone guuid=36607ad0-1900-0000-23ca-4c108b0e0000 pid=3723 /usr/bin/busybox net send-data write-file guuid=ee650ffe-1800-0000-23ca-4c10290d0000 pid=3369->guuid=36607ad0-1900-0000-23ca-4c108b0e0000 pid=3723 execve guuid=f4dad51f-1a00-0000-23ca-4c10560f0000 pid=3926 /usr/bin/chmod guuid=ee650ffe-1800-0000-23ca-4c10290d0000 pid=3369->guuid=f4dad51f-1a00-0000-23ca-4c10560f0000 pid=3926 execve guuid=16644c20-1a00-0000-23ca-4c10580f0000 pid=3928 /usr/bin/dash guuid=ee650ffe-1800-0000-23ca-4c10290d0000 pid=3369->guuid=16644c20-1a00-0000-23ca-4c10580f0000 pid=3928 clone guuid=3b5c7e22-1a00-0000-23ca-4c10600f0000 pid=3936 /usr/bin/busybox net send-data write-file guuid=ee650ffe-1800-0000-23ca-4c10290d0000 pid=3369->guuid=3b5c7e22-1a00-0000-23ca-4c10600f0000 pid=3936 execve guuid=404f9670-1a00-0000-23ca-4c101a100000 pid=4122 /usr/bin/chmod guuid=ee650ffe-1800-0000-23ca-4c10290d0000 pid=3369->guuid=404f9670-1a00-0000-23ca-4c101a100000 pid=4122 execve guuid=1360ea70-1a00-0000-23ca-4c101c100000 pid=4124 /usr/bin/dash guuid=ee650ffe-1800-0000-23ca-4c10290d0000 pid=3369->guuid=1360ea70-1a00-0000-23ca-4c101c100000 pid=4124 clone guuid=4be88773-1a00-0000-23ca-4c1024100000 pid=4132 /usr/bin/busybox net send-data write-file guuid=ee650ffe-1800-0000-23ca-4c10290d0000 pid=3369->guuid=4be88773-1a00-0000-23ca-4c1024100000 pid=4132 execve guuid=58b499b7-1a00-0000-23ca-4c10a9100000 pid=4265 /usr/bin/chmod guuid=ee650ffe-1800-0000-23ca-4c10290d0000 pid=3369->guuid=58b499b7-1a00-0000-23ca-4c10a9100000 pid=4265 execve guuid=fa0e23b8-1a00-0000-23ca-4c10ad100000 pid=4269 /usr/bin/dash guuid=ee650ffe-1800-0000-23ca-4c10290d0000 pid=3369->guuid=fa0e23b8-1a00-0000-23ca-4c10ad100000 pid=4269 clone guuid=9a94c9b9-1a00-0000-23ca-4c10b2100000 pid=4274 /usr/bin/busybox net send-data write-file guuid=ee650ffe-1800-0000-23ca-4c10290d0000 pid=3369->guuid=9a94c9b9-1a00-0000-23ca-4c10b2100000 pid=4274 execve guuid=05c6defb-1a00-0000-23ca-4c104b110000 pid=4427 /usr/bin/chmod guuid=ee650ffe-1800-0000-23ca-4c10290d0000 pid=3369->guuid=05c6defb-1a00-0000-23ca-4c104b110000 pid=4427 execve guuid=5d5394fc-1a00-0000-23ca-4c104f110000 pid=4431 /usr/bin/dash guuid=ee650ffe-1800-0000-23ca-4c10290d0000 pid=3369->guuid=5d5394fc-1a00-0000-23ca-4c104f110000 pid=4431 clone fd17f377-6c1a-50e8-b822-f55ae4fd390f 103.146.23.241:80 guuid=43b28603-1900-0000-23ca-4c10400d0000 pid=3392->fd17f377-6c1a-50e8-b822-f55ae4fd390f send: 80B guuid=ed770847-1900-0000-23ca-4c10b90d0000 pid=3513->fd17f377-6c1a-50e8-b822-f55ae4fd390f send: 81B guuid=691e608c-1900-0000-23ca-4c10110e0000 pid=3601->fd17f377-6c1a-50e8-b822-f55ae4fd390f send: 81B guuid=36607ad0-1900-0000-23ca-4c108b0e0000 pid=3723->fd17f377-6c1a-50e8-b822-f55ae4fd390f send: 81B guuid=3b5c7e22-1a00-0000-23ca-4c10600f0000 pid=3936->fd17f377-6c1a-50e8-b822-f55ae4fd390f send: 81B guuid=4be88773-1a00-0000-23ca-4c1024100000 pid=4132->fd17f377-6c1a-50e8-b822-f55ae4fd390f send: 80B guuid=9a94c9b9-1a00-0000-23ca-4c10b2100000 pid=4274->fd17f377-6c1a-50e8-b822-f55ae4fd390f send: 84B
Verdict:
Malicious
Threat:
Trojan-Downloader.Shell.Agent
Threat name:
Win32.Trojan.Vigorf
Status:
Malicious
First seen:
2025-12-16 07:27:07 UTC
File Type:
Text (Shell)
AV detection:
15 of 38 (39.47%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  9/10
Tags:
antivm credential_access defense_evasion discovery linux
Behaviour
Reads runtime system information
System Network Configuration Discovery
Writes file to tmp directory
Changes its process name
Checks CPU configuration
Reads system network configuration
Reads process memory
Enumerates active TCP sockets
Enumerates running processes
File and Directory Permissions Modification
Executes dropped EXE
Renames itself
Unexpected DNS network traffic destination
Contacts a large (26285) amount of remote hosts
Creates a large amount of network flows
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh a290473152a45a20cfb20cc2633006e3419509c92144ae5ce2a05fc86331022e

(this sample)

  
Delivery method
Distributed via web download

Comments