MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 a5cd680e63cdf65ea00876b76a9d6a5fc7e3d00edbb54656a854a5ed7e83481a. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 8


Intelligence 8 IOCs YARA 1 File information Comments

SHA256 hash: a5cd680e63cdf65ea00876b76a9d6a5fc7e3d00edbb54656a854a5ed7e83481a
SHA3-384 hash: 1542b2a25f7a8438306f0494f099d272c8000d7b4a708ddc61b2eb6d5980465bbf58b44dbc145db09f06ccd8c34276a4
SHA1 hash: 3b03808495f451cb1f2b3bec2beab84d004ec5f8
MD5 hash: 07e8b38d866b41a1210ef22dca5b76bb
humanhash: arizona-papa-mars-bulldog
File name:1.sh
Download: download sample
Signature Mirai
File size:2'842 bytes
First seen:2025-05-14 08:37:30 UTC
Last seen:Never
File type: sh
MIME type:text/x-shellscript
ssdeep 24:ItMP8nM1Y1IikM1nyMq7qBhMgIMk9+M/xY3MqWqM0QMRxAM2EMSvEMB2MpoMf2H:iNsI6n+wcayTtkl+/E7bD
TLSH T14F51D0C527214A70BDE75D7263FB184D3492E4A11CD9DE88DAEC3CB49A8CD18708DB5B
Magika shell
Reporter abuse_ch
Tags:mirai sh
URLMalware sample (SHA256 hash)SignatureTags
http://160.187.246.174/dwrioej/neon.x86n/an/an/a
http://160.187.246.174/dwrioej/neon.mipsae4dd9e52d19fb43bd52329ed391b40f73b906dc6d454cf151f18a893cc3c4fd Miraielf gafgyt mirai ua-wget
http://160.187.246.174/dwrioej/neon.arcfbe1bc145c75887ae1d6617d874a91438f19eb77a103ce7d27af53343ddf42c3 Miraielf mirai ua-wget
http://160.187.246.174/dwrioej/neon.i468n/an/an/a
http://160.187.246.174/dwrioej/neon.i686563076b4551774011b7c5aab9a95ef08dd05b42cb0474ecc9366ef3d7252ae77 Miraielf mirai ua-wget
http://160.187.246.174/dwrioej/neon.x86_64442ec3ce185bdd4db8be714001ef37dd4b76cc060f3793f10e2cdbcd263ecc4a Miraielf mirai ua-wget
http://160.187.246.174/dwrioej/neon.mpsln/an/an/a
http://160.187.246.174/dwrioej/neon.armn/an/an/a
http://160.187.246.174/dwrioej/neon.arm5n/an/an/a
http://160.187.246.174/dwrioej/neon.arm6n/an/an/a
http://160.187.246.174/dwrioej/neon.arm7n/an/an/a
http://160.187.246.174/dwrioej/neon.ppcn/an/an/a
http://160.187.246.174/dwrioej/neon.spcn/an/an/a
http://160.187.246.174/dwrioej/neon.m68k933278ebb70eea318497489db852284950b7e2e5b825a519fe2ed3911b7fb393 Miraielf mirai ua-wget
http://160.187.246.174/dwrioej/neon.sh4706eb26071fb107decadd1d3cbf4a0b54b5c8742459738d832bab07f5c607437 Miraielf mirai ua-wget

Intelligence


File Origin
# of uploads :
1
# of downloads :
98
Origin country :
DE DE
Vendor Threat Intelligence
Verdict:
Malicious
Score:
99.9%
Tags:
downloader backdoor agent
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
busybox
Threat name:
Linux.Downloader.Medusa
Status:
Malicious
First seen:
2025-05-14 08:07:06 UTC
File Type:
Text (Shell)
AV detection:
23 of 37 (62.16%)
Threat level:
  3/5
Result
Malware family:
Score:
  10/10
Tags:
family:mirai antivm botnet defense_evasion discovery linux upx
Behaviour
Reads runtime system information
System Network Configuration Discovery
Writes file to tmp directory
Checks CPU configuration
Reads system network configuration
UPX packed file
Enumerates active TCP sockets
Enumerates running processes
Writes file to system bin folder
File and Directory Permissions Modification
Executes dropped EXE
Modifies Watchdog functionality
Mirai
Mirai family
Malware Config
C2 Extraction:
traxanhc2.duckdns.org
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Linux_Shellscript_Downloader
Author:albertzsigovits
Description:Generic Approach to Shellscript downloaders

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh a5cd680e63cdf65ea00876b76a9d6a5fc7e3d00edbb54656a854a5ed7e83481a

(this sample)

  
Delivery method
Distributed via web download

Comments