MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 a9e85bde12756b258d58addb60970f2e0c928ea139fe5ed4e2ac43532b7d984b. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: a9e85bde12756b258d58addb60970f2e0c928ea139fe5ed4e2ac43532b7d984b
SHA3-384 hash: 3cf4dd8e5977e08686f945eb27127b20c19037239ac01456873dcad2f0ceaa42fd949523ea2c38f15c3e63743c641f3e
SHA1 hash: f92d57546e45ccfc628b11fffb4a0c1ef3820c12
MD5 hash: 07a15db698718b7a2aefb10a02e81629
humanhash: victor-lake-yankee-tennessee
File name:c.sh
Download: download sample
Signature Mirai
File size:1'152 bytes
First seen:2026-01-05 13:54:57 UTC
Last seen:2026-01-06 10:50:40 UTC
File type: sh
MIME type:text/plain
ssdeep 24:3J3nEELbMB3VEczLNIZEtcDEVKTNCEHq/EOB9METKP3E3eMEbEKP3eEzMgE19Idz:zCjntQNQ/p2EedPX6Arx
TLSH T1B82108CF10A8F9A6654CCF4470AA908979F4C6E5F5704913A964B8F394C820327B8FFB
Magika batch
Reporter abuse_ch
Tags:sh
URLMalware sample (SHA256 hash)SignatureTags
http://130.12.180.28/Fantazy/Fantazy.armn/an/aelf ua-wget
http://130.12.180.28/Fantazy/Fantazy.arm59df7c2bebdee16b4907509ea8cdfc4128a8c2c0fb21156ed8105db2cf8f4ecf2 Miraielf mirai
http://130.12.180.28/Fantazy/Fantazy.arm69c6625a0a04aee9ac1fe10d55edc2f0aa77f66593916a10cb8314ad29457edeb Miraielf mirai
http://130.12.180.28/Fantazy/Fantazy.arm748b94eff6e2031ce3fd8f0c605917b5a55b26a2d9e1800b9612758189e794631 Miraielf mirai
http://130.12.180.28/Fantazy/Fantazy.m68k4b6f0caf42dc42e3f8f4e7adc9a93435cb27d604df131e19503be23fbc955826 Miraielf mirai
http://130.12.180.28/Fantazy/Fantazy.mips9997ba3aad89be8f8371620b5b841eaa71da6f32368d84363bab6dd57303929c Miraielf mirai
http://130.12.180.28/Fantazy/Fantazy.mpsleeb8b37ab92777cbe5c49834cc044393207e0b745a0e2d0806b7da4e6292000b Miraielf mirai
http://130.12.180.28/Fantazy/Fantazy.ppc1f0a93ffbe48da5f9d8188060be1d5ce128fdc1545c2077a22bff830b19302cf Miraielf mirai
http://130.12.180.28/Fantazy/Fantazy.sh469a6fc590d0f527d1c6e04a9cf1c84eb52ca88de7867e8e8cf31b0b67d94eb70 Miraielf mirai
http://130.12.180.28/Fantazy/Fantazy.spcd1d3129a68b9da3ed82981110c4d48721d47a176134b004e4e34544d1e2b1cd9 Miraielf mirai
http://130.12.180.28/Fantazy/Fantazy.x86ad613cf0f480c1c00f15379fc0df01af6d6c14309c9d0e452bd5e71ec6342c0f Miraielf mirai
http://130.12.180.28/Fantazy/Fantazy.x86_645443d764e399f0cd44ef17ea0940db73fc635045faa26f0ce8a4d8b3453b5988 Miraielf mirai

Intelligence


File Origin
# of uploads :
2
# of downloads :
59
Origin country :
DE DE
Vendor Threat Intelligence
No detections
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
mirai
Verdict:
Malicious
File Type:
text
First seen:
2026-01-05T11:01:00Z UTC
Last seen:
2026-01-07T06:32:00Z UTC
Hits:
~10
Detections:
HEUR:Trojan-Downloader.Shell.Agent.cl
Status:
terminated
Behavior Graph:
%3 guuid=709a134f-1500-0000-ee8e-1cea200c0000 pid=3104 /usr/bin/sudo guuid=ba1ec950-1500-0000-ee8e-1cea250c0000 pid=3109 /tmp/sample.bin guuid=709a134f-1500-0000-ee8e-1cea200c0000 pid=3104->guuid=ba1ec950-1500-0000-ee8e-1cea250c0000 pid=3109 execve guuid=4de70351-1500-0000-ee8e-1cea270c0000 pid=3111 /usr/bin/curl net send-data guuid=ba1ec950-1500-0000-ee8e-1cea250c0000 pid=3109->guuid=4de70351-1500-0000-ee8e-1cea270c0000 pid=3111 execve guuid=94dcec58-1500-0000-ee8e-1cea3e0c0000 pid=3134 /usr/bin/chmod guuid=ba1ec950-1500-0000-ee8e-1cea250c0000 pid=3109->guuid=94dcec58-1500-0000-ee8e-1cea3e0c0000 pid=3134 execve guuid=29a43259-1500-0000-ee8e-1cea3f0c0000 pid=3135 /usr/bin/dash guuid=ba1ec950-1500-0000-ee8e-1cea250c0000 pid=3109->guuid=29a43259-1500-0000-ee8e-1cea3f0c0000 pid=3135 clone guuid=807b4159-1500-0000-ee8e-1cea400c0000 pid=3136 /usr/bin/curl net send-data guuid=ba1ec950-1500-0000-ee8e-1cea250c0000 pid=3109->guuid=807b4159-1500-0000-ee8e-1cea400c0000 pid=3136 execve guuid=b1f5105f-1500-0000-ee8e-1cea4b0c0000 pid=3147 /usr/bin/chmod guuid=ba1ec950-1500-0000-ee8e-1cea250c0000 pid=3109->guuid=b1f5105f-1500-0000-ee8e-1cea4b0c0000 pid=3147 execve guuid=2f0dc95f-1500-0000-ee8e-1cea4d0c0000 pid=3149 /usr/bin/dash guuid=ba1ec950-1500-0000-ee8e-1cea250c0000 pid=3109->guuid=2f0dc95f-1500-0000-ee8e-1cea4d0c0000 pid=3149 clone guuid=27870760-1500-0000-ee8e-1cea4e0c0000 pid=3150 /usr/bin/curl net send-data guuid=ba1ec950-1500-0000-ee8e-1cea250c0000 pid=3109->guuid=27870760-1500-0000-ee8e-1cea4e0c0000 pid=3150 execve guuid=65817f67-1500-0000-ee8e-1cea5f0c0000 pid=3167 /usr/bin/chmod guuid=ba1ec950-1500-0000-ee8e-1cea250c0000 pid=3109->guuid=65817f67-1500-0000-ee8e-1cea5f0c0000 pid=3167 execve guuid=133ec067-1500-0000-ee8e-1cea610c0000 pid=3169 /usr/bin/dash guuid=ba1ec950-1500-0000-ee8e-1cea250c0000 pid=3109->guuid=133ec067-1500-0000-ee8e-1cea610c0000 pid=3169 clone guuid=16cfc867-1500-0000-ee8e-1cea620c0000 pid=3170 /usr/bin/curl net send-data guuid=ba1ec950-1500-0000-ee8e-1cea250c0000 pid=3109->guuid=16cfc867-1500-0000-ee8e-1cea620c0000 pid=3170 execve guuid=3e46d270-1500-0000-ee8e-1cea660c0000 pid=3174 /usr/bin/chmod guuid=ba1ec950-1500-0000-ee8e-1cea250c0000 pid=3109->guuid=3e46d270-1500-0000-ee8e-1cea660c0000 pid=3174 execve guuid=38835071-1500-0000-ee8e-1cea670c0000 pid=3175 /usr/bin/dash guuid=ba1ec950-1500-0000-ee8e-1cea250c0000 pid=3109->guuid=38835071-1500-0000-ee8e-1cea670c0000 pid=3175 clone guuid=43536671-1500-0000-ee8e-1cea680c0000 pid=3176 /usr/bin/curl net send-data guuid=ba1ec950-1500-0000-ee8e-1cea250c0000 pid=3109->guuid=43536671-1500-0000-ee8e-1cea680c0000 pid=3176 execve guuid=79949277-1500-0000-ee8e-1cea6a0c0000 pid=3178 /usr/bin/chmod guuid=ba1ec950-1500-0000-ee8e-1cea250c0000 pid=3109->guuid=79949277-1500-0000-ee8e-1cea6a0c0000 pid=3178 execve guuid=35c7de77-1500-0000-ee8e-1cea6b0c0000 pid=3179 /usr/bin/dash guuid=ba1ec950-1500-0000-ee8e-1cea250c0000 pid=3109->guuid=35c7de77-1500-0000-ee8e-1cea6b0c0000 pid=3179 clone guuid=34e3e877-1500-0000-ee8e-1cea6c0c0000 pid=3180 /usr/bin/curl net send-data guuid=ba1ec950-1500-0000-ee8e-1cea250c0000 pid=3109->guuid=34e3e877-1500-0000-ee8e-1cea6c0c0000 pid=3180 execve guuid=48dabb7d-1500-0000-ee8e-1cea7e0c0000 pid=3198 /usr/bin/chmod guuid=ba1ec950-1500-0000-ee8e-1cea250c0000 pid=3109->guuid=48dabb7d-1500-0000-ee8e-1cea7e0c0000 pid=3198 execve guuid=86380d7e-1500-0000-ee8e-1cea7f0c0000 pid=3199 /usr/bin/dash guuid=ba1ec950-1500-0000-ee8e-1cea250c0000 pid=3109->guuid=86380d7e-1500-0000-ee8e-1cea7f0c0000 pid=3199 clone guuid=c0321f7e-1500-0000-ee8e-1cea810c0000 pid=3201 /usr/bin/curl net send-data guuid=ba1ec950-1500-0000-ee8e-1cea250c0000 pid=3109->guuid=c0321f7e-1500-0000-ee8e-1cea810c0000 pid=3201 execve guuid=b95bea86-1500-0000-ee8e-1cea8d0c0000 pid=3213 /usr/bin/chmod guuid=ba1ec950-1500-0000-ee8e-1cea250c0000 pid=3109->guuid=b95bea86-1500-0000-ee8e-1cea8d0c0000 pid=3213 execve guuid=aaca4287-1500-0000-ee8e-1cea8f0c0000 pid=3215 /usr/bin/dash guuid=ba1ec950-1500-0000-ee8e-1cea250c0000 pid=3109->guuid=aaca4287-1500-0000-ee8e-1cea8f0c0000 pid=3215 clone guuid=c5785487-1500-0000-ee8e-1cea910c0000 pid=3217 /usr/bin/curl net send-data guuid=ba1ec950-1500-0000-ee8e-1cea250c0000 pid=3109->guuid=c5785487-1500-0000-ee8e-1cea910c0000 pid=3217 execve guuid=7b76978c-1500-0000-ee8e-1cea960c0000 pid=3222 /usr/bin/chmod guuid=ba1ec950-1500-0000-ee8e-1cea250c0000 pid=3109->guuid=7b76978c-1500-0000-ee8e-1cea960c0000 pid=3222 execve guuid=3bd1f88c-1500-0000-ee8e-1cea970c0000 pid=3223 /usr/bin/dash guuid=ba1ec950-1500-0000-ee8e-1cea250c0000 pid=3109->guuid=3bd1f88c-1500-0000-ee8e-1cea970c0000 pid=3223 clone guuid=0c36178d-1500-0000-ee8e-1cea980c0000 pid=3224 /usr/bin/curl net send-data guuid=ba1ec950-1500-0000-ee8e-1cea250c0000 pid=3109->guuid=0c36178d-1500-0000-ee8e-1cea980c0000 pid=3224 execve guuid=3a3e7594-1500-0000-ee8e-1cea990c0000 pid=3225 /usr/bin/chmod guuid=ba1ec950-1500-0000-ee8e-1cea250c0000 pid=3109->guuid=3a3e7594-1500-0000-ee8e-1cea990c0000 pid=3225 execve guuid=6efdf394-1500-0000-ee8e-1cea9a0c0000 pid=3226 /usr/bin/dash guuid=ba1ec950-1500-0000-ee8e-1cea250c0000 pid=3109->guuid=6efdf394-1500-0000-ee8e-1cea9a0c0000 pid=3226 clone guuid=d8a5fb94-1500-0000-ee8e-1cea9b0c0000 pid=3227 /usr/bin/curl net send-data guuid=ba1ec950-1500-0000-ee8e-1cea250c0000 pid=3109->guuid=d8a5fb94-1500-0000-ee8e-1cea9b0c0000 pid=3227 execve guuid=74508e9d-1500-0000-ee8e-1ceaa90c0000 pid=3241 /usr/bin/chmod guuid=ba1ec950-1500-0000-ee8e-1cea250c0000 pid=3109->guuid=74508e9d-1500-0000-ee8e-1ceaa90c0000 pid=3241 execve guuid=4344ce9d-1500-0000-ee8e-1ceaab0c0000 pid=3243 /usr/bin/dash guuid=ba1ec950-1500-0000-ee8e-1cea250c0000 pid=3109->guuid=4344ce9d-1500-0000-ee8e-1ceaab0c0000 pid=3243 clone guuid=d979db9d-1500-0000-ee8e-1ceaac0c0000 pid=3244 /usr/bin/curl net send-data guuid=ba1ec950-1500-0000-ee8e-1cea250c0000 pid=3109->guuid=d979db9d-1500-0000-ee8e-1ceaac0c0000 pid=3244 execve guuid=6808d2a5-1500-0000-ee8e-1ceab40c0000 pid=3252 /usr/bin/chmod guuid=ba1ec950-1500-0000-ee8e-1cea250c0000 pid=3109->guuid=6808d2a5-1500-0000-ee8e-1ceab40c0000 pid=3252 execve guuid=115321a6-1500-0000-ee8e-1ceab50c0000 pid=3253 /usr/bin/dash guuid=ba1ec950-1500-0000-ee8e-1cea250c0000 pid=3109->guuid=115321a6-1500-0000-ee8e-1ceab50c0000 pid=3253 clone guuid=95372ea6-1500-0000-ee8e-1ceab60c0000 pid=3254 /usr/bin/curl net send-data guuid=ba1ec950-1500-0000-ee8e-1cea250c0000 pid=3109->guuid=95372ea6-1500-0000-ee8e-1ceab60c0000 pid=3254 execve guuid=3a0573ab-1500-0000-ee8e-1ceac00c0000 pid=3264 /usr/bin/chmod guuid=ba1ec950-1500-0000-ee8e-1cea250c0000 pid=3109->guuid=3a0573ab-1500-0000-ee8e-1ceac00c0000 pid=3264 execve guuid=8502a5ab-1500-0000-ee8e-1ceac20c0000 pid=3266 /usr/bin/dash guuid=ba1ec950-1500-0000-ee8e-1cea250c0000 pid=3109->guuid=8502a5ab-1500-0000-ee8e-1ceac20c0000 pid=3266 clone guuid=39b1acab-1500-0000-ee8e-1ceac30c0000 pid=3267 /usr/bin/rm delete-file guuid=ba1ec950-1500-0000-ee8e-1cea250c0000 pid=3109->guuid=39b1acab-1500-0000-ee8e-1ceac30c0000 pid=3267 execve b6a64ba0-71d1-5d3d-a9f9-c19471e8250a 130.12.180.28:80 guuid=4de70351-1500-0000-ee8e-1cea270c0000 pid=3111->b6a64ba0-71d1-5d3d-a9f9-c19471e8250a send: 96B guuid=807b4159-1500-0000-ee8e-1cea400c0000 pid=3136->b6a64ba0-71d1-5d3d-a9f9-c19471e8250a send: 97B guuid=27870760-1500-0000-ee8e-1cea4e0c0000 pid=3150->b6a64ba0-71d1-5d3d-a9f9-c19471e8250a send: 97B guuid=16cfc867-1500-0000-ee8e-1cea620c0000 pid=3170->b6a64ba0-71d1-5d3d-a9f9-c19471e8250a send: 97B guuid=43536671-1500-0000-ee8e-1cea680c0000 pid=3176->b6a64ba0-71d1-5d3d-a9f9-c19471e8250a send: 97B guuid=34e3e877-1500-0000-ee8e-1cea6c0c0000 pid=3180->b6a64ba0-71d1-5d3d-a9f9-c19471e8250a send: 97B guuid=c0321f7e-1500-0000-ee8e-1cea810c0000 pid=3201->b6a64ba0-71d1-5d3d-a9f9-c19471e8250a send: 97B guuid=c5785487-1500-0000-ee8e-1cea910c0000 pid=3217->b6a64ba0-71d1-5d3d-a9f9-c19471e8250a send: 96B guuid=0c36178d-1500-0000-ee8e-1cea980c0000 pid=3224->b6a64ba0-71d1-5d3d-a9f9-c19471e8250a send: 96B guuid=d8a5fb94-1500-0000-ee8e-1cea9b0c0000 pid=3227->b6a64ba0-71d1-5d3d-a9f9-c19471e8250a send: 96B guuid=d979db9d-1500-0000-ee8e-1ceaac0c0000 pid=3244->b6a64ba0-71d1-5d3d-a9f9-c19471e8250a send: 96B guuid=95372ea6-1500-0000-ee8e-1ceab60c0000 pid=3254->b6a64ba0-71d1-5d3d-a9f9-c19471e8250a send: 99B
Verdict:
Malicious
Threat:
Trojan-Downloader.Shell.Agent
Threat name:
Linux.Trojan.Vigorf
Status:
Malicious
First seen:
2026-01-05 13:55:15 UTC
File Type:
Text (Shell)
AV detection:
12 of 24 (50.00%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Modifies registry class
Suspicious use of SetWindowsHookEx
Enumerates physical storage devices
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh a9e85bde12756b258d58addb60970f2e0c928ea139fe5ed4e2ac43532b7d984b

(this sample)

  
Delivery method
Distributed via web download

Comments