MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 a89363a9770a74252a80ba69d225812e638e290a77ee2901975ed0f4f7f0dc8a. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 9


Intelligence 9 IOCs YARA 2 File information Comments

SHA256 hash: a89363a9770a74252a80ba69d225812e638e290a77ee2901975ed0f4f7f0dc8a
SHA3-384 hash: 31cee9e0073f39b9d5fb6ad10612839c72d5d69df37e37464187938e3e70e6c2c7b5b2352e51c94119f86783fa7fe9ce
SHA1 hash: 7b659068d177668172cebfde00852d309bb4086a
MD5 hash: 31e7d8ccbeaebbc80687efb097d6b7c0
humanhash: texas-carolina-magazine-romeo
File name:ohshit.sh
Download: download sample
Signature Mirai
File size:3'724 bytes
First seen:2026-02-06 18:14:17 UTC
Last seen:Never
File type: sh
MIME type:text/x-shellscript
ssdeep 96:iv3N3Wx3k3O3CB3yE3530353G3c3o3T3Ywz:09mx0+SBjpkp2sYDoW
TLSH T13371A391F812407C1D2A9B62ADFB51BAF049B3C7B4E77A0FB99828F5618CF005589DD1
TrID 70.0% (.SH) Linux/UNIX shell script (7000/1)
30.0% (.) Unix-like shebang (var.3) (gen) (3000/1)
Magika shell
Reporter abuse_ch
Tags:mirai sh
URLMalware sample (SHA256 hash)SignatureTags
http://37.221.65.33/HideChaotic/ub8ehJSePAfc9FYqZIT6.arc6c1eb958d98d7ed84163cb9ebbd01f6951d1a08cab6447c803e3774d0ce15f29 Miraielf ua-wget
http://37.221.65.33/HideChaotic/ub8ehJSePAfc9FYqZIT6.x8644416a0e03e3023fbbe9fe9902b88fb7e91e220ba51d66e84f6e8b36b00cbe31 Miraielf ua-wget
http://37.221.65.33/HideChaotic/ub8ehJSePAfc9FYqZIT6.x86_6443f061b3363390f9a18c45ebfa7e1ecf5b816b8c89c3bab854c1949e66308f59 Miraielf ua-wget
http://37.221.65.33/HideChaotic/ub8ehJSePAfc9FYqZIT6.i6867e9f6d938f9a646812f5689172c76d7268fa6408b4014dc5f0c3039dd5dcb43c Miraielf ua-wget
http://37.221.65.33/HideChaotic/ub8ehJSePAfc9FYqZIT6.mips38f5e2dcbc7636ea968e7765c2ec2b8e9ace6faae5f3c067a32cbd7e151c2e21 Miraielf ua-wget
http://37.221.65.33/HideChaotic/ub8ehJSePAfc9FYqZIT6.mips64n/an/aelf ua-wget
http://37.221.65.33/HideChaotic/ub8ehJSePAfc9FYqZIT6.mpslc2f74d83d6ea88ea9275391cff7d6abebc1689e562aa00a0f083aae191bbae86 Miraielf ua-wget
http://37.221.65.33/HideChaotic/ub8ehJSePAfc9FYqZIT6.armc22b631e109685d77cef7c70e083ed02aefed9e50aed1d37a440a36e989c2b76 Miraielf ua-wget
http://37.221.65.33/HideChaotic/ub8ehJSePAfc9FYqZIT6.arm578b30c10048387bf7255a785339d1f6001b8e67d2a63ce8781a45ae6fc784c82 Miraielf ua-wget
http://37.221.65.33/HideChaotic/ub8ehJSePAfc9FYqZIT6.arm64409752a9a014c5699614f0f834392292cb14f889d55bd63b332a50af4c04220 Miraielf ua-wget
http://37.221.65.33/HideChaotic/ub8ehJSePAfc9FYqZIT6.arm7f0c00c47ab00f051efa5776deaac34d0ccd2ebb8a9fff90db83cb877c50732b1 Miraielf ua-wget
http://37.221.65.33/HideChaotic/ub8ehJSePAfc9FYqZIT6.ppc1b006631bebae3f724055e4d835abea40399bfcc2a517d235731527db9904a5f Miraielf ua-wget
http://37.221.65.33/HideChaotic/ub8ehJSePAfc9FYqZIT6.sparcn/an/aelf ua-wget
http://37.221.65.33/HideChaotic/ub8ehJSePAfc9FYqZIT6.m68k702c5ff22698a3df5ba6e08e8325fb311726df2408e85e9bfbf07058a23fcfb4 Miraielf ua-wget
http://37.221.65.33/HideChaotic/ub8ehJSePAfc9FYqZIT6.sh40a0565a2216f09fa039902f24f4e1c7ef05fadd5f338109d518e7007135bd09a Miraielf ua-wget

Intelligence


File Origin
# of uploads :
1
# of downloads :
44
Origin country :
DE DE
Vendor Threat Intelligence
No detections
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
busybox medusa mirai obfuscated
Result
Gathering data
Verdict:
Malicious
File Type:
Script
Detections:
HEUR:Trojan-Downloader.Shell.Agent.p HEUR:Trojan-Downloader.Shell.Agent.gen HEUR:Trojan-Downloader.Shell.Agent.a
Threat name:
Linux.Downloader.Medusa
Status:
Malicious
First seen:
2026-02-06 18:15:22 UTC
File Type:
Text (Shell)
AV detection:
22 of 36 (61.11%)
Threat level:
  3/5
Result
Malware family:
Score:
  10/10
Tags:
family:mirai botnet:lzrd antivm botnet defense_evasion discovery linux upx
Behaviour
Reads runtime system information
System Network Configuration Discovery
Writes file to tmp directory
Changes its process name
Checks CPU configuration
UPX packed file
Writes file to system bin folder
File and Directory Permissions Modification
Executes dropped EXE
Modifies Watchdog functionality
Mirai
Mirai family
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Linux_Shellscript_Downloader
Author:albertzsigovits
Description:Generic Approach to Shellscript downloaders
Rule name:MAL_Linux_IoT_MultiArch_BotnetLoader_Generic
Author:Anish Bogati
Description:Technique-based detection of IoT/Linux botnet loader shell scripts downloading binaries from numeric IPs, chmodding, and executing multi-architecture payloads
Reference:MalwareBazaar sample lilin.sh

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh a89363a9770a74252a80ba69d225812e638e290a77ee2901975ed0f4f7f0dc8a

(this sample)

  
Delivery method
Distributed via web download

Comments