MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 a8db0a2b795536b9c017d2cee950a7be09e492592c5cd4f1f5a982286bb1018e. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: a8db0a2b795536b9c017d2cee950a7be09e492592c5cd4f1f5a982286bb1018e
SHA3-384 hash: c15bced82511e90d82b2d95ac96d86ec7a06767cbfe2759df192f308df027ee98d02f4aacb8d8773723363472694697f
SHA1 hash: ad5bf9b7aefcfd8fcb605aed075624f400693d03
MD5 hash: ba64984a1bd8f3412815645358d5e28a
humanhash: washington-johnny-kitten-oklahoma
File name:curl.sh
Download: download sample
Signature Mirai
File size:1'144 bytes
First seen:2025-09-06 19:49:07 UTC
Last seen:Never
File type: sh
MIME type:text/x-shellscript
ssdeep 24:ThBh9Mk8QoLIBUF1npLOW3FJp5liAEkqloatkkzACrivj:ThL8Qog89pFViAFat/znyj
TLSH T132219EDC9181AB325AE48C34B6C3E53F506B52D661A02D90B41B1FA3F7DCA82B0D4736
Magika shell
Reporter abuse_ch
Tags:mirai sh
URLMalware sample (SHA256 hash)SignatureTags
http://160.250.134.48/arme16a5e543be159372994cf2bd528b703cfc4ebe667e153a34de20e13de0bc265 Miraiarm elf geofenced mirai ua-wget USA
http://160.250.134.48/arm5ef0759560923799625dbffbc95e23935d0c09da4aad0e7e285a24510c1255a97 Miraiarm elf geofenced mirai ua-wget USA
http://160.250.134.48/arm76509f8d5312e74b83dcc973477b33d6a439bc050545d2bc54962f9b43d8ddf88 Miraiarm elf geofenced mirai ua-wget USA
http://160.250.134.48/mipsfd75057993af111cf29aeb0924554d01ad28c071fb20cf9700831fd4402fbaf2 Miraielf gafgyt geofenced mips mirai ua-wget USA
http://160.250.134.48/mpslfc2117cb6a4433fc0a3711ce912f4a1794741dfe467cf7c64ac9250e125b927c Miraielf geofenced mips mirai ua-wget USA

Intelligence


File Origin
# of uploads :
1
# of downloads :
32
Origin country :
DE DE
Vendor Threat Intelligence
Verdict:
Malicious
File Type:
unix shell
First seen:
2025-09-06T16:58:00Z UTC
Last seen:
2025-09-06T16:58:00Z UTC
Hits:
~10
Detections:
HEUR:Trojan-Downloader.Shell.Agent.a
Status:
terminated
Behavior Graph:
%3 guuid=ddf7772d-1a00-0000-e4e6-b1f51c0b0000 pid=2844 /usr/bin/sudo guuid=141fe52f-1a00-0000-e4e6-b1f5230b0000 pid=2851 /tmp/sample.bin guuid=ddf7772d-1a00-0000-e4e6-b1f51c0b0000 pid=2844->guuid=141fe52f-1a00-0000-e4e6-b1f5230b0000 pid=2851 execve guuid=b9c33035-1a00-0000-e4e6-b1f5310b0000 pid=2865 /usr/bin/cp guuid=141fe52f-1a00-0000-e4e6-b1f5230b0000 pid=2851->guuid=b9c33035-1a00-0000-e4e6-b1f5310b0000 pid=2865 execve guuid=52b55a38-1a00-0000-e4e6-b1f53a0b0000 pid=2874 /usr/bin/curl net send-data write-file guuid=141fe52f-1a00-0000-e4e6-b1f5230b0000 pid=2851->guuid=52b55a38-1a00-0000-e4e6-b1f53a0b0000 pid=2874 execve guuid=170bcc85-1a00-0000-e4e6-b1f5d10b0000 pid=3025 /usr/bin/chmod guuid=141fe52f-1a00-0000-e4e6-b1f5230b0000 pid=2851->guuid=170bcc85-1a00-0000-e4e6-b1f5d10b0000 pid=3025 execve guuid=77a82286-1a00-0000-e4e6-b1f5d30b0000 pid=3027 /usr/bin/dash guuid=141fe52f-1a00-0000-e4e6-b1f5230b0000 pid=2851->guuid=77a82286-1a00-0000-e4e6-b1f5d30b0000 pid=3027 clone guuid=da06bf86-1a00-0000-e4e6-b1f5d70b0000 pid=3031 /usr/bin/cp guuid=141fe52f-1a00-0000-e4e6-b1f5230b0000 pid=2851->guuid=da06bf86-1a00-0000-e4e6-b1f5d70b0000 pid=3031 execve guuid=c280a387-1a00-0000-e4e6-b1f5da0b0000 pid=3034 /usr/bin/curl net send-data write-file guuid=141fe52f-1a00-0000-e4e6-b1f5230b0000 pid=2851->guuid=c280a387-1a00-0000-e4e6-b1f5da0b0000 pid=3034 execve guuid=65e02ccf-1a00-0000-e4e6-b1f56d0c0000 pid=3181 /usr/bin/chmod guuid=141fe52f-1a00-0000-e4e6-b1f5230b0000 pid=2851->guuid=65e02ccf-1a00-0000-e4e6-b1f56d0c0000 pid=3181 execve guuid=49d668cf-1a00-0000-e4e6-b1f56e0c0000 pid=3182 /usr/bin/dash guuid=141fe52f-1a00-0000-e4e6-b1f5230b0000 pid=2851->guuid=49d668cf-1a00-0000-e4e6-b1f56e0c0000 pid=3182 clone guuid=09c038d0-1a00-0000-e4e6-b1f5700c0000 pid=3184 /usr/bin/cp guuid=141fe52f-1a00-0000-e4e6-b1f5230b0000 pid=2851->guuid=09c038d0-1a00-0000-e4e6-b1f5700c0000 pid=3184 execve guuid=f4a5e2d0-1a00-0000-e4e6-b1f5720c0000 pid=3186 /usr/bin/curl net send-data write-file guuid=141fe52f-1a00-0000-e4e6-b1f5230b0000 pid=2851->guuid=f4a5e2d0-1a00-0000-e4e6-b1f5720c0000 pid=3186 execve guuid=d6c6a319-1b00-0000-e4e6-b1f5ce0c0000 pid=3278 /usr/bin/chmod guuid=141fe52f-1a00-0000-e4e6-b1f5230b0000 pid=2851->guuid=d6c6a319-1b00-0000-e4e6-b1f5ce0c0000 pid=3278 execve guuid=d6f1021a-1b00-0000-e4e6-b1f5cf0c0000 pid=3279 /usr/bin/dash guuid=141fe52f-1a00-0000-e4e6-b1f5230b0000 pid=2851->guuid=d6f1021a-1b00-0000-e4e6-b1f5cf0c0000 pid=3279 clone guuid=42dbd31a-1b00-0000-e4e6-b1f5d30c0000 pid=3283 /usr/bin/cp guuid=141fe52f-1a00-0000-e4e6-b1f5230b0000 pid=2851->guuid=42dbd31a-1b00-0000-e4e6-b1f5d30c0000 pid=3283 execve guuid=7338da1b-1b00-0000-e4e6-b1f5d70c0000 pid=3287 /usr/bin/curl net send-data write-file guuid=141fe52f-1a00-0000-e4e6-b1f5230b0000 pid=2851->guuid=7338da1b-1b00-0000-e4e6-b1f5d70c0000 pid=3287 execve guuid=a63bb166-1b00-0000-e4e6-b1f56d0d0000 pid=3437 /usr/bin/chmod guuid=141fe52f-1a00-0000-e4e6-b1f5230b0000 pid=2851->guuid=a63bb166-1b00-0000-e4e6-b1f56d0d0000 pid=3437 execve guuid=f481ed66-1b00-0000-e4e6-b1f56e0d0000 pid=3438 /usr/bin/dash guuid=141fe52f-1a00-0000-e4e6-b1f5230b0000 pid=2851->guuid=f481ed66-1b00-0000-e4e6-b1f56e0d0000 pid=3438 clone guuid=5e398c67-1b00-0000-e4e6-b1f5720d0000 pid=3442 /usr/bin/cp guuid=141fe52f-1a00-0000-e4e6-b1f5230b0000 pid=2851->guuid=5e398c67-1b00-0000-e4e6-b1f5720d0000 pid=3442 execve guuid=646f2e68-1b00-0000-e4e6-b1f5750d0000 pid=3445 /usr/bin/curl net send-data write-file guuid=141fe52f-1a00-0000-e4e6-b1f5230b0000 pid=2851->guuid=646f2e68-1b00-0000-e4e6-b1f5750d0000 pid=3445 execve guuid=c52856bc-1b00-0000-e4e6-b1f51f0e0000 pid=3615 /usr/bin/chmod guuid=141fe52f-1a00-0000-e4e6-b1f5230b0000 pid=2851->guuid=c52856bc-1b00-0000-e4e6-b1f51f0e0000 pid=3615 execve guuid=96b3c0bc-1b00-0000-e4e6-b1f5210e0000 pid=3617 /usr/bin/dash guuid=141fe52f-1a00-0000-e4e6-b1f5230b0000 pid=2851->guuid=96b3c0bc-1b00-0000-e4e6-b1f5210e0000 pid=3617 clone 2398d6d7-9b73-5561-a5f7-2e279e659454 160.250.134.48:80 guuid=52b55a38-1a00-0000-e4e6-b1f53a0b0000 pid=2874->2398d6d7-9b73-5561-a5f7-2e279e659454 send: 81B guuid=c280a387-1a00-0000-e4e6-b1f5da0b0000 pid=3034->2398d6d7-9b73-5561-a5f7-2e279e659454 send: 82B guuid=f4a5e2d0-1a00-0000-e4e6-b1f5720c0000 pid=3186->2398d6d7-9b73-5561-a5f7-2e279e659454 send: 82B guuid=7338da1b-1b00-0000-e4e6-b1f5d70c0000 pid=3287->2398d6d7-9b73-5561-a5f7-2e279e659454 send: 82B guuid=646f2e68-1b00-0000-e4e6-b1f5750d0000 pid=3445->2398d6d7-9b73-5561-a5f7-2e279e659454 send: 82B
Threat name:
Linux.Downloader.SAgnt
Status:
Malicious
First seen:
2025-09-06 19:54:24 UTC
File Type:
Text (Shell)
AV detection:
12 of 38 (31.58%)
Threat level:
  3/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
antivm credential_access defense_evasion discovery linux
Behaviour
Reads runtime system information
System Network Configuration Discovery
Writes file to tmp directory
Changes its process name
Checks CPU configuration
Reads system network configuration
Reads process memory
Enumerates running processes
Reads MAC address of network interface
Reads system routing table
File and Directory Permissions Modification
Executes dropped EXE
Renames itself
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh a8db0a2b795536b9c017d2cee950a7be09e492592c5cd4f1f5a982286bb1018e

(this sample)

  
Delivery method
Distributed via web download

Comments