MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 acdeb9f2c3af7a5e8add1bb05ea1d5b11233b69bb942932716d96fc7f7bbe1f4. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: acdeb9f2c3af7a5e8add1bb05ea1d5b11233b69bb942932716d96fc7f7bbe1f4
SHA3-384 hash: 71e907d643544e310625e47415bb8bfbcbcfd778a049c4630c12530ddb1a6d1bad0f1a48d52fb2c8dd6f487b3fd183e1
SHA1 hash: f21aea53d6b70996858d60dd05be9759a096cc96
MD5 hash: 26c83201954986eca8b2f9f49b4fa860
humanhash: kilo-island-fifteen-emma
File name:wget.sh
Download: download sample
Signature Mirai
File size:834 bytes
First seen:2025-09-11 05:29:31 UTC
Last seen:Never
File type: sh
MIME type:text/plain
ssdeep 12:63ZeLhF3ZeCYZ3ZerNIl5W3Ze40LKG3ZeK+OF63Ze3jMS3ZeZTtjV3ZeeSOZU3ZJ:vYANI7lKY+IZjoT5vl1tx3Yn
TLSH T1170100DE77B162AEC908CE28A17544849134B2C0325C0F6A5DC51CF3D8D97093E25E79
Magika asm
Reporter abuse_ch
Tags:mirai sh
URLMalware sample (SHA256 hash)SignatureTags
http://161.97.106.129/systemcl/arma2812bf91c1836b0749615f8c92f49b055ed1152a0cfcb03cffb4473388ae1f9 Miraielf mirai
http://161.97.106.129/systemcl/arm5467ca3ecdb388a31f9687f3f93134ae992fbfbe2936cfbd700c3d198b3b65ecb Miraielf mirai
http://161.97.106.129/systemcl/arm67a4627901da5e02ceacaf688cc103b4944a3cf75b4f1f4316ee638893eaa4104 Miraielf mirai
http://161.97.106.129/systemcl/arm71745a1dc09e108e719186017f4d6f10e1835aa4ba3f74b50b8394e3268c66524 Miraielf mirai
http://161.97.106.129/systemcl/m68k19abfca0200531ee5ddc2dd7bc4454af84d9ffe0ef2e12cd2a54fc828ebdc659 Miraielf mirai
http://161.97.106.129/systemcl/mipsad42066092b60784e1579fb3742cf3a41450dacc13b254e9c3a0c5b84aaf0db4 Miraielf mirai
http://161.97.106.129/systemcl/mpsl7365564e3fc5bc60caa91eb8b6b87a6d8da423389be87134899fcd0caaeb3242 Miraielf mirai
http://161.97.106.129/systemcl/ppcabfd19ac36a02a8d3552a65a6e023b7499af427f7ea558cbc5064b8475bd955e Miraielf mirai
http://161.97.106.129/systemcl/sh4b5d5a320320766751e9a1e31bc6ff850196e0c3f0b5baee15eee600b8a3cdae2 Miraielf mirai
http://161.97.106.129/systemcl/spc2b4e44a8a37c63ce0a2c007bb22d903ae9d13b643b6b556f4d15199926cdd54c Miraielf mirai
http://161.97.106.129/systemcl/x862e9b4bb064c078485eab38389da45cfecd1f865d77cd5c199ae3c2fe195daf72 Miraielf mirai
http://161.97.106.129/systemcl/x86_6447a0fa2b9aa3ebdb48324d5ad43903187a528176193716db81991191b3d3b230 Miraielf mirai

Intelligence


File Origin
# of uploads :
1
# of downloads :
45
Origin country :
DE DE
Vendor Threat Intelligence
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
evasive
Verdict:
Malicious
File Type:
text
First seen:
2025-09-10T09:41:00Z UTC
Last seen:
2025-09-10T09:41:00Z UTC
Hits:
~10
Detections:
HEUR:Trojan-Downloader.Shell.Agent.a
Status:
terminated
Behavior Graph:
%3 guuid=ae0b131a-1a00-0000-87c3-3d85be0a0000 pid=2750 /usr/bin/sudo guuid=5024a61b-1a00-0000-87c3-3d85c40a0000 pid=2756 /tmp/sample.bin guuid=ae0b131a-1a00-0000-87c3-3d85be0a0000 pid=2750->guuid=5024a61b-1a00-0000-87c3-3d85c40a0000 pid=2756 execve guuid=72ebd81b-1a00-0000-87c3-3d85c50a0000 pid=2757 /usr/bin/wget net send-data write-file guuid=5024a61b-1a00-0000-87c3-3d85c40a0000 pid=2756->guuid=72ebd81b-1a00-0000-87c3-3d85c50a0000 pid=2757 execve guuid=81e9e426-1a00-0000-87c3-3d85cd0a0000 pid=2765 /usr/bin/chmod guuid=5024a61b-1a00-0000-87c3-3d85c40a0000 pid=2756->guuid=81e9e426-1a00-0000-87c3-3d85cd0a0000 pid=2765 execve guuid=296b7127-1a00-0000-87c3-3d85ce0a0000 pid=2766 /usr/bin/dash guuid=5024a61b-1a00-0000-87c3-3d85c40a0000 pid=2756->guuid=296b7127-1a00-0000-87c3-3d85ce0a0000 pid=2766 clone guuid=a1289428-1a00-0000-87c3-3d85d00a0000 pid=2768 /usr/bin/wget net send-data write-file guuid=5024a61b-1a00-0000-87c3-3d85c40a0000 pid=2756->guuid=a1289428-1a00-0000-87c3-3d85d00a0000 pid=2768 execve guuid=217f722d-1a00-0000-87c3-3d85d70a0000 pid=2775 /usr/bin/chmod guuid=5024a61b-1a00-0000-87c3-3d85c40a0000 pid=2756->guuid=217f722d-1a00-0000-87c3-3d85d70a0000 pid=2775 execve guuid=6102ae2d-1a00-0000-87c3-3d85d90a0000 pid=2777 /usr/bin/dash guuid=5024a61b-1a00-0000-87c3-3d85c40a0000 pid=2756->guuid=6102ae2d-1a00-0000-87c3-3d85d90a0000 pid=2777 clone guuid=9be3412e-1a00-0000-87c3-3d85db0a0000 pid=2779 /usr/bin/wget net send-data write-file guuid=5024a61b-1a00-0000-87c3-3d85c40a0000 pid=2756->guuid=9be3412e-1a00-0000-87c3-3d85db0a0000 pid=2779 execve guuid=ebb74f31-1a00-0000-87c3-3d85e30a0000 pid=2787 /usr/bin/chmod guuid=5024a61b-1a00-0000-87c3-3d85c40a0000 pid=2756->guuid=ebb74f31-1a00-0000-87c3-3d85e30a0000 pid=2787 execve guuid=e6109031-1a00-0000-87c3-3d85e40a0000 pid=2788 /usr/bin/dash guuid=5024a61b-1a00-0000-87c3-3d85c40a0000 pid=2756->guuid=e6109031-1a00-0000-87c3-3d85e40a0000 pid=2788 clone guuid=b8beee32-1a00-0000-87c3-3d85e70a0000 pid=2791 /usr/bin/wget net send-data write-file guuid=5024a61b-1a00-0000-87c3-3d85c40a0000 pid=2756->guuid=b8beee32-1a00-0000-87c3-3d85e70a0000 pid=2791 execve guuid=36e4de35-1a00-0000-87c3-3d85ef0a0000 pid=2799 /usr/bin/chmod guuid=5024a61b-1a00-0000-87c3-3d85c40a0000 pid=2756->guuid=36e4de35-1a00-0000-87c3-3d85ef0a0000 pid=2799 execve guuid=01472336-1a00-0000-87c3-3d85f10a0000 pid=2801 /usr/bin/dash guuid=5024a61b-1a00-0000-87c3-3d85c40a0000 pid=2756->guuid=01472336-1a00-0000-87c3-3d85f10a0000 pid=2801 clone guuid=051ab536-1a00-0000-87c3-3d85f40a0000 pid=2804 /usr/bin/wget net send-data write-file guuid=5024a61b-1a00-0000-87c3-3d85c40a0000 pid=2756->guuid=051ab536-1a00-0000-87c3-3d85f40a0000 pid=2804 execve guuid=2ff7b33d-1a00-0000-87c3-3d85fd0a0000 pid=2813 /usr/bin/chmod guuid=5024a61b-1a00-0000-87c3-3d85c40a0000 pid=2756->guuid=2ff7b33d-1a00-0000-87c3-3d85fd0a0000 pid=2813 execve guuid=5e59073e-1a00-0000-87c3-3d85ff0a0000 pid=2815 /usr/bin/dash guuid=5024a61b-1a00-0000-87c3-3d85c40a0000 pid=2756->guuid=5e59073e-1a00-0000-87c3-3d85ff0a0000 pid=2815 clone guuid=e3a6d240-1a00-0000-87c3-3d85050b0000 pid=2821 /usr/bin/wget net send-data write-file guuid=5024a61b-1a00-0000-87c3-3d85c40a0000 pid=2756->guuid=e3a6d240-1a00-0000-87c3-3d85050b0000 pid=2821 execve guuid=bc0fdf47-1a00-0000-87c3-3d85120b0000 pid=2834 /usr/bin/chmod guuid=5024a61b-1a00-0000-87c3-3d85c40a0000 pid=2756->guuid=bc0fdf47-1a00-0000-87c3-3d85120b0000 pid=2834 execve guuid=1a6b2948-1a00-0000-87c3-3d85130b0000 pid=2835 /usr/bin/dash guuid=5024a61b-1a00-0000-87c3-3d85c40a0000 pid=2756->guuid=1a6b2948-1a00-0000-87c3-3d85130b0000 pid=2835 clone guuid=45d73349-1a00-0000-87c3-3d85160b0000 pid=2838 /usr/bin/wget net send-data write-file guuid=5024a61b-1a00-0000-87c3-3d85c40a0000 pid=2756->guuid=45d73349-1a00-0000-87c3-3d85160b0000 pid=2838 execve guuid=07edc54f-1a00-0000-87c3-3d85210b0000 pid=2849 /usr/bin/chmod guuid=5024a61b-1a00-0000-87c3-3d85c40a0000 pid=2756->guuid=07edc54f-1a00-0000-87c3-3d85210b0000 pid=2849 execve guuid=edd20250-1a00-0000-87c3-3d85220b0000 pid=2850 /usr/bin/dash guuid=5024a61b-1a00-0000-87c3-3d85c40a0000 pid=2756->guuid=edd20250-1a00-0000-87c3-3d85220b0000 pid=2850 clone guuid=87b37a50-1a00-0000-87c3-3d85250b0000 pid=2853 /usr/bin/wget net send-data write-file guuid=5024a61b-1a00-0000-87c3-3d85c40a0000 pid=2756->guuid=87b37a50-1a00-0000-87c3-3d85250b0000 pid=2853 execve guuid=2c444253-1a00-0000-87c3-3d852c0b0000 pid=2860 /usr/bin/chmod guuid=5024a61b-1a00-0000-87c3-3d85c40a0000 pid=2756->guuid=2c444253-1a00-0000-87c3-3d852c0b0000 pid=2860 execve guuid=00b78d53-1a00-0000-87c3-3d852e0b0000 pid=2862 /usr/bin/dash guuid=5024a61b-1a00-0000-87c3-3d85c40a0000 pid=2756->guuid=00b78d53-1a00-0000-87c3-3d852e0b0000 pid=2862 clone guuid=e16e1b54-1a00-0000-87c3-3d85310b0000 pid=2865 /usr/bin/wget net send-data write-file guuid=5024a61b-1a00-0000-87c3-3d85c40a0000 pid=2756->guuid=e16e1b54-1a00-0000-87c3-3d85310b0000 pid=2865 execve guuid=1e2fd95a-1a00-0000-87c3-3d853f0b0000 pid=2879 /usr/bin/chmod guuid=5024a61b-1a00-0000-87c3-3d85c40a0000 pid=2756->guuid=1e2fd95a-1a00-0000-87c3-3d853f0b0000 pid=2879 execve guuid=f6134c5b-1a00-0000-87c3-3d85410b0000 pid=2881 /usr/bin/dash guuid=5024a61b-1a00-0000-87c3-3d85c40a0000 pid=2756->guuid=f6134c5b-1a00-0000-87c3-3d85410b0000 pid=2881 clone guuid=3ff5a05d-1a00-0000-87c3-3d85450b0000 pid=2885 /usr/bin/wget net send-data write-file guuid=5024a61b-1a00-0000-87c3-3d85c40a0000 pid=2756->guuid=3ff5a05d-1a00-0000-87c3-3d85450b0000 pid=2885 execve guuid=b63a7861-1a00-0000-87c3-3d854e0b0000 pid=2894 /usr/bin/chmod guuid=5024a61b-1a00-0000-87c3-3d85c40a0000 pid=2756->guuid=b63a7861-1a00-0000-87c3-3d854e0b0000 pid=2894 execve guuid=1b52dd61-1a00-0000-87c3-3d85500b0000 pid=2896 /usr/bin/dash guuid=5024a61b-1a00-0000-87c3-3d85c40a0000 pid=2756->guuid=1b52dd61-1a00-0000-87c3-3d85500b0000 pid=2896 clone guuid=8c936b62-1a00-0000-87c3-3d85540b0000 pid=2900 /usr/bin/wget net send-data write-file guuid=5024a61b-1a00-0000-87c3-3d85c40a0000 pid=2756->guuid=8c936b62-1a00-0000-87c3-3d85540b0000 pid=2900 execve guuid=ceac5b65-1a00-0000-87c3-3d855e0b0000 pid=2910 /usr/bin/chmod guuid=5024a61b-1a00-0000-87c3-3d85c40a0000 pid=2756->guuid=ceac5b65-1a00-0000-87c3-3d855e0b0000 pid=2910 execve guuid=903b9e65-1a00-0000-87c3-3d85600b0000 pid=2912 /home/sandbox/x86 net guuid=5024a61b-1a00-0000-87c3-3d85c40a0000 pid=2756->guuid=903b9e65-1a00-0000-87c3-3d85600b0000 pid=2912 execve guuid=f0407977-1a00-0000-87c3-3d85930b0000 pid=2963 /usr/bin/wget net send-data write-file guuid=5024a61b-1a00-0000-87c3-3d85c40a0000 pid=2756->guuid=f0407977-1a00-0000-87c3-3d85930b0000 pid=2963 execve guuid=652a457b-1a00-0000-87c3-3d85950b0000 pid=2965 /usr/bin/chmod guuid=5024a61b-1a00-0000-87c3-3d85c40a0000 pid=2756->guuid=652a457b-1a00-0000-87c3-3d85950b0000 pid=2965 execve guuid=6bf9a67b-1a00-0000-87c3-3d85960b0000 pid=2966 /usr/bin/dash guuid=5024a61b-1a00-0000-87c3-3d85c40a0000 pid=2756->guuid=6bf9a67b-1a00-0000-87c3-3d85960b0000 pid=2966 clone guuid=b7024e7d-1a00-0000-87c3-3d85980b0000 pid=2968 /usr/bin/rm delete-file guuid=5024a61b-1a00-0000-87c3-3d85c40a0000 pid=2756->guuid=b7024e7d-1a00-0000-87c3-3d85980b0000 pid=2968 execve 2b1801dc-b67a-5da1-8e84-0d7a99e1894a 161.97.106.129:80 guuid=72ebd81b-1a00-0000-87c3-3d85c50a0000 pid=2757->2b1801dc-b67a-5da1-8e84-0d7a99e1894a send: 141B guuid=a1289428-1a00-0000-87c3-3d85d00a0000 pid=2768->2b1801dc-b67a-5da1-8e84-0d7a99e1894a send: 142B guuid=9be3412e-1a00-0000-87c3-3d85db0a0000 pid=2779->2b1801dc-b67a-5da1-8e84-0d7a99e1894a send: 142B guuid=b8beee32-1a00-0000-87c3-3d85e70a0000 pid=2791->2b1801dc-b67a-5da1-8e84-0d7a99e1894a send: 142B guuid=051ab536-1a00-0000-87c3-3d85f40a0000 pid=2804->2b1801dc-b67a-5da1-8e84-0d7a99e1894a send: 142B guuid=e3a6d240-1a00-0000-87c3-3d85050b0000 pid=2821->2b1801dc-b67a-5da1-8e84-0d7a99e1894a send: 142B guuid=45d73349-1a00-0000-87c3-3d85160b0000 pid=2838->2b1801dc-b67a-5da1-8e84-0d7a99e1894a send: 142B guuid=87b37a50-1a00-0000-87c3-3d85250b0000 pid=2853->2b1801dc-b67a-5da1-8e84-0d7a99e1894a send: 141B guuid=e16e1b54-1a00-0000-87c3-3d85310b0000 pid=2865->2b1801dc-b67a-5da1-8e84-0d7a99e1894a send: 141B guuid=3ff5a05d-1a00-0000-87c3-3d85450b0000 pid=2885->2b1801dc-b67a-5da1-8e84-0d7a99e1894a send: 141B guuid=8c936b62-1a00-0000-87c3-3d85540b0000 pid=2900->2b1801dc-b67a-5da1-8e84-0d7a99e1894a send: 141B 8b0a01dc-0728-52c1-8024-c4ba7801b8d6 8.8.8.8:53 guuid=903b9e65-1a00-0000-87c3-3d85600b0000 pid=2912->8b0a01dc-0728-52c1-8024-c4ba7801b8d6 con guuid=0bfe6f77-1a00-0000-87c3-3d85910b0000 pid=2961 /home/sandbox/x86 guuid=903b9e65-1a00-0000-87c3-3d85600b0000 pid=2912->guuid=0bfe6f77-1a00-0000-87c3-3d85910b0000 pid=2961 clone guuid=9e3c7477-1a00-0000-87c3-3d85920b0000 pid=2962 /home/sandbox/x86 net send-data zombie guuid=903b9e65-1a00-0000-87c3-3d85600b0000 pid=2912->guuid=9e3c7477-1a00-0000-87c3-3d85920b0000 pid=2962 clone guuid=9e3c7477-1a00-0000-87c3-3d85920b0000 pid=2962->8b0a01dc-0728-52c1-8024-c4ba7801b8d6 con dfbb6132-9b3a-5fcc-ae73-0a5bea22ee6b 87.121.84.220:61459 guuid=9e3c7477-1a00-0000-87c3-3d85920b0000 pid=2962->dfbb6132-9b3a-5fcc-ae73-0a5bea22ee6b send: 43B guuid=f0407977-1a00-0000-87c3-3d85930b0000 pid=2963->2b1801dc-b67a-5da1-8e84-0d7a99e1894a send: 144B
Threat name:
Linux.Trojan.Vigorf
Status:
Malicious
First seen:
2025-09-10 17:55:37 UTC
File Type:
Text (Shell)
AV detection:
19 of 38 (50.00%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Modifies registry class
Suspicious use of SetWindowsHookEx
Enumerates physical storage devices
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh acdeb9f2c3af7a5e8add1bb05ea1d5b11233b69bb942932716d96fc7f7bbe1f4

(this sample)

  
Delivery method
Distributed via web download

Comments