MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 a3c6896c569118bc40fd12db9516c8a2dd60690a4e5d1eddce11b792b254e6bc. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 8


Intelligence 8 IOCs YARA File information Comments

SHA256 hash: a3c6896c569118bc40fd12db9516c8a2dd60690a4e5d1eddce11b792b254e6bc
SHA3-384 hash: 1d0f690e6be06ba6244c76e116786da5c1f5dc4acd7cc484857e5ac50053f254377d273e4acaa594469bd32e70ace0a8
SHA1 hash: e33c1a89a3575eee082440d1a866002d51475cac
MD5 hash: 87b700ca138d39ce95abc6a5053cd039
humanhash: twenty-nitrogen-autumn-fish
File name:check1.sh
Download: download sample
Signature Mirai
File size:993 bytes
First seen:2026-01-15 02:32:23 UTC
Last seen:Never
File type: sh
MIME type:text/x-shellscript
ssdeep 24:VUeYj+H1wDMK9CFdYhEnHQBYw9I5xqARWy3AnQZaZl1cSRs/:VUeYj+H1wDMK9CnYhEYwquWywOjSu
TLSH T17511AF8277356CB12DCD812D72AB989D6042023F561B7F98749B98B71F1C580F094FB4
TrID 70.0% (.SH) Linux/UNIX shell script (7000/1)
30.0% (.) Unix-like shebang (var.3) (gen) (3000/1)
Magika shell
Reporter abuse_ch
Tags:mirai sh
URLMalware sample (SHA256 hash)SignatureTags
http://77.221.152.211/check1.sha3c6896c569118bc40fd12db9516c8a2dd60690a4e5d1eddce11b792b254e6bc Miraimirai sh ua-wget
http://77.221.152.211/Error840c4bfa96b30bf3046a70d8a0143ed419a7cd58b55091c85da619a8a22cd31e1b Miraielf mirai ua-wget

Intelligence


File Origin
# of uploads :
1
# of downloads :
56
Origin country :
DE DE
Vendor Threat Intelligence
No detections
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
bash lolbin
Result
Gathering data
Verdict:
Malicious
File Type:
Script
Detections:
HEUR:Trojan-Downloader.Shell.Agent.cw
Status:
terminated
Behavior Graph:
%3 guuid=6f3cb0ff-1700-0000-1a81-fa1ec60c0000 pid=3270 /usr/bin/sudo guuid=f8f35a02-1800-0000-1a81-fa1ecf0c0000 pid=3279 /tmp/sample.bin guuid=6f3cb0ff-1700-0000-1a81-fa1ec60c0000 pid=3270->guuid=f8f35a02-1800-0000-1a81-fa1ecf0c0000 pid=3279 execve guuid=6c786d03-1800-0000-1a81-fa1ed30c0000 pid=3283 /usr/bin/bash guuid=f8f35a02-1800-0000-1a81-fa1ecf0c0000 pid=3279->guuid=6c786d03-1800-0000-1a81-fa1ed30c0000 pid=3283 clone guuid=38639503-1800-0000-1a81-fa1ed50c0000 pid=3285 /usr/bin/grep guuid=f8f35a02-1800-0000-1a81-fa1ecf0c0000 pid=3279->guuid=38639503-1800-0000-1a81-fa1ed50c0000 pid=3285 execve guuid=95462b04-1800-0000-1a81-fa1ed80c0000 pid=3288 /usr/bin/bash guuid=f8f35a02-1800-0000-1a81-fa1ecf0c0000 pid=3279->guuid=95462b04-1800-0000-1a81-fa1ed80c0000 pid=3288 clone guuid=ee1b4204-1800-0000-1a81-fa1ed90c0000 pid=3289 /usr/bin/bash guuid=f8f35a02-1800-0000-1a81-fa1ecf0c0000 pid=3279->guuid=ee1b4204-1800-0000-1a81-fa1ed90c0000 pid=3289 clone guuid=3d06ae04-1800-0000-1a81-fa1edc0c0000 pid=3292 /usr/bin/pgrep guuid=f8f35a02-1800-0000-1a81-fa1ecf0c0000 pid=3279->guuid=3d06ae04-1800-0000-1a81-fa1edc0c0000 pid=3292 execve guuid=7dc3a70b-1800-0000-1a81-fa1ef00c0000 pid=3312 /usr/bin/rm delete-file guuid=f8f35a02-1800-0000-1a81-fa1ecf0c0000 pid=3279->guuid=7dc3a70b-1800-0000-1a81-fa1ef00c0000 pid=3312 execve guuid=5a548e0f-1800-0000-1a81-fa1efc0c0000 pid=3324 /usr/bin/sleep guuid=f8f35a02-1800-0000-1a81-fa1ecf0c0000 pid=3279->guuid=5a548e0f-1800-0000-1a81-fa1efc0c0000 pid=3324 execve guuid=769b243a-1900-0000-1a81-fa1ee80f0000 pid=4072 /usr/bin/curl net send-data write-file guuid=f8f35a02-1800-0000-1a81-fa1ecf0c0000 pid=3279->guuid=769b243a-1900-0000-1a81-fa1ee80f0000 pid=4072 execve guuid=904b7c4e-1900-0000-1a81-fa1e07100000 pid=4103 /usr/bin/wget net send-data write-file guuid=f8f35a02-1800-0000-1a81-fa1ecf0c0000 pid=3279->guuid=904b7c4e-1900-0000-1a81-fa1e07100000 pid=4103 execve guuid=eef65064-1900-0000-1a81-fa1e0a100000 pid=4106 /usr/bin/sleep guuid=f8f35a02-1800-0000-1a81-fa1ecf0c0000 pid=3279->guuid=eef65064-1900-0000-1a81-fa1e0a100000 pid=4106 execve guuid=42fa2253-1a00-0000-1a81-fa1e1d100000 pid=4125 /usr/bin/chmod guuid=f8f35a02-1800-0000-1a81-fa1ecf0c0000 pid=3279->guuid=42fa2253-1a00-0000-1a81-fa1e1d100000 pid=4125 execve guuid=06c5a253-1a00-0000-1a81-fa1e1e100000 pid=4126 /usr/bin/bash guuid=f8f35a02-1800-0000-1a81-fa1ecf0c0000 pid=3279->guuid=06c5a253-1a00-0000-1a81-fa1e1e100000 pid=4126 clone guuid=5046bc53-1a00-0000-1a81-fa1e20100000 pid=4128 /usr/bin/rm guuid=f8f35a02-1800-0000-1a81-fa1ecf0c0000 pid=3279->guuid=5046bc53-1a00-0000-1a81-fa1e20100000 pid=4128 execve guuid=2ce92154-1a00-0000-1a81-fa1e21100000 pid=4129 /usr/bin/sleep guuid=f8f35a02-1800-0000-1a81-fa1ecf0c0000 pid=3279->guuid=2ce92154-1a00-0000-1a81-fa1e21100000 pid=4129 execve guuid=51faa77e-1b00-0000-1a81-fa1e22100000 pid=4130 /usr/bin/rm guuid=f8f35a02-1800-0000-1a81-fa1ecf0c0000 pid=3279->guuid=51faa77e-1b00-0000-1a81-fa1e22100000 pid=4130 execve guuid=872a3d7f-1b00-0000-1a81-fa1e23100000 pid=4131 /usr/bin/rm delete-file guuid=f8f35a02-1800-0000-1a81-fa1ecf0c0000 pid=3279->guuid=872a3d7f-1b00-0000-1a81-fa1e23100000 pid=4131 execve guuid=2c21927f-1b00-0000-1a81-fa1e24100000 pid=4132 /usr/bin/rm delete-file guuid=f8f35a02-1800-0000-1a81-fa1ecf0c0000 pid=3279->guuid=2c21927f-1b00-0000-1a81-fa1e24100000 pid=4132 execve guuid=c72b1b80-1b00-0000-1a81-fa1e25100000 pid=4133 /usr/bin/rm delete-file guuid=f8f35a02-1800-0000-1a81-fa1ecf0c0000 pid=3279->guuid=c72b1b80-1b00-0000-1a81-fa1e25100000 pid=4133 execve guuid=75b36a80-1b00-0000-1a81-fa1e26100000 pid=4134 /usr/bin/rm delete-file guuid=f8f35a02-1800-0000-1a81-fa1ecf0c0000 pid=3279->guuid=75b36a80-1b00-0000-1a81-fa1e26100000 pid=4134 execve guuid=9ae31b81-1b00-0000-1a81-fa1e27100000 pid=4135 /usr/bin/rm guuid=f8f35a02-1800-0000-1a81-fa1ecf0c0000 pid=3279->guuid=9ae31b81-1b00-0000-1a81-fa1e27100000 pid=4135 execve guuid=2a0f9f81-1b00-0000-1a81-fa1e28100000 pid=4136 /usr/bin/clear guuid=f8f35a02-1800-0000-1a81-fa1ecf0c0000 pid=3279->guuid=2a0f9f81-1b00-0000-1a81-fa1e28100000 pid=4136 execve guuid=03794804-1800-0000-1a81-fa1eda0c0000 pid=3290 /usr/bin/bash guuid=95462b04-1800-0000-1a81-fa1ed80c0000 pid=3288->guuid=03794804-1800-0000-1a81-fa1eda0c0000 pid=3290 clone 66bedfa7-f5b5-5fb6-937f-c65dc36db775 77.221.152.211:80 guuid=769b243a-1900-0000-1a81-fa1ee80f0000 pid=4072->66bedfa7-f5b5-5fb6-937f-c65dc36db775 send: 85B guuid=904b7c4e-1900-0000-1a81-fa1e07100000 pid=4103->66bedfa7-f5b5-5fb6-937f-c65dc36db775 send: 136B
Threat name:
Linux.Downloader.Generic
Status:
Suspicious
First seen:
2026-01-15 02:33:27 UTC
File Type:
Text (Shell)
AV detection:
4 of 36 (11.11%)
Threat level:
  3/5
Result
Malware family:
Score:
  10/10
Tags:
family:xmrig antivm defense_evasion discovery execution linux miner persistence privilege_escalation
Behaviour
Reads runtime system information
Checks CPU configuration
Reads CPU attributes
Creates/modifies Cron job
Deletes log files
Enumerates running processes
File and Directory Permissions Modification
Indicator Removal: Clear Command History
Executes dropped EXE
XMRig Miner payload
Xmrig family
xmrig
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh a3c6896c569118bc40fd12db9516c8a2dd60690a4e5d1eddce11b792b254e6bc

(this sample)

  
Delivery method
Distributed via web download

Comments