MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 af384db55ea2aa72c039c7aa501032396113ca2a82ad8b251281a9a66efa03a1. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 5


Intelligence 5 IOCs YARA File information Comments

SHA256 hash: af384db55ea2aa72c039c7aa501032396113ca2a82ad8b251281a9a66efa03a1
SHA3-384 hash: 9dbbcc24249bb22a57010ed77ea9b298475eb28076215c36549a03d70bccae80cb238f2549844d9c8329be95eea71fd2
SHA1 hash: d3c8ff80a471b9e1e9db05f53f30183b26beacee
MD5 hash: 8291268f7b35b2d45b77446da94002f7
humanhash: football-three-beer-oxygen
File name:ipcam.tplink.sh
Download: download sample
Signature Mirai
File size:695 bytes
First seen:2025-08-23 19:24:09 UTC
Last seen:2025-08-24 18:36:06 UTC
File type: sh
MIME type:text/plain
ssdeep 12:7ppRwVhRpRrWz4VhKZpRrTmLVhKYhpReaIaVhEpRgVhY0pRtMaVhn:TaVhvlVh0mVhzfAMVh+KVhYOjVhn
TLSH T17201A28F545D7612F5F89A42381A4B249F0D928BFCD01FA0D9DE78B2C78CC24F9A5A42
Magika shell
Reporter abuse_ch
Tags:sh
URLMalware sample (SHA256 hash)SignatureTags
http://196.251.84.253/kitty.arm824235df77016d1aad750a9f52919f521f7354f124a9d710d4a3c98d4b64615f Ngiowebelf mirai Ngioweb ua-wget
http://196.251.84.253/kitty.mipsn/an/aelf mirai ua-wget
http://196.251.84.253/kitty.mipselcb93ba4bdeca9b98b820e6a54f5ce7259c6dea673d8ee2b92e88d39f70efb8ea Miraielf mirai ua-wget
http://196.251.84.253/kitty.aarch641a930b4aa7c5f6e140466a8309037bf5def5614f7ed514bd9010868b8f51710b Tsunamielf mirai Tsunami ua-wget
http://196.251.84.253/kitty.x86f9f93bed6018700b5d961c16acd4bff913c697831df29fa1d91dafcdd50686ec Miraielf mirai ua-wget
http://196.251.84.253/kitty.x86_64n/an/aelf mirai ua-wget

Intelligence


File Origin
# of uploads :
3
# of downloads :
28
Origin country :
DE DE
Vendor Threat Intelligence
Status:
terminated
Behavior Graph:
%3 guuid=b7a39e91-1b00-0000-f2f7-30a9330c0000 pid=3123 /usr/bin/sudo guuid=5fd75e93-1b00-0000-f2f7-30a93b0c0000 pid=3131 /tmp/sample.bin guuid=b7a39e91-1b00-0000-f2f7-30a9330c0000 pid=3123->guuid=5fd75e93-1b00-0000-f2f7-30a93b0c0000 pid=3131 execve guuid=6d9c9b93-1b00-0000-f2f7-30a93c0c0000 pid=3132 /usr/bin/wget net send-data write-file guuid=5fd75e93-1b00-0000-f2f7-30a93b0c0000 pid=3131->guuid=6d9c9b93-1b00-0000-f2f7-30a93c0c0000 pid=3132 execve guuid=e555449a-1b00-0000-f2f7-30a9520c0000 pid=3154 /usr/bin/chmod guuid=5fd75e93-1b00-0000-f2f7-30a93b0c0000 pid=3131->guuid=e555449a-1b00-0000-f2f7-30a9520c0000 pid=3154 execve guuid=48d78e9a-1b00-0000-f2f7-30a9530c0000 pid=3155 /usr/bin/dash guuid=5fd75e93-1b00-0000-f2f7-30a93b0c0000 pid=3131->guuid=48d78e9a-1b00-0000-f2f7-30a9530c0000 pid=3155 clone guuid=118f1f9b-1b00-0000-f2f7-30a9550c0000 pid=3157 /usr/bin/rm delete-file guuid=5fd75e93-1b00-0000-f2f7-30a93b0c0000 pid=3131->guuid=118f1f9b-1b00-0000-f2f7-30a9550c0000 pid=3157 execve guuid=d5405d9b-1b00-0000-f2f7-30a9560c0000 pid=3158 /usr/bin/wget net send-data write-file guuid=5fd75e93-1b00-0000-f2f7-30a93b0c0000 pid=3131->guuid=d5405d9b-1b00-0000-f2f7-30a9560c0000 pid=3158 execve guuid=a659909f-1b00-0000-f2f7-30a9610c0000 pid=3169 /usr/bin/chmod guuid=5fd75e93-1b00-0000-f2f7-30a93b0c0000 pid=3131->guuid=a659909f-1b00-0000-f2f7-30a9610c0000 pid=3169 execve guuid=6a162aa0-1b00-0000-f2f7-30a9620c0000 pid=3170 /usr/bin/dash guuid=5fd75e93-1b00-0000-f2f7-30a93b0c0000 pid=3131->guuid=6a162aa0-1b00-0000-f2f7-30a9620c0000 pid=3170 clone guuid=9dedf0a0-1b00-0000-f2f7-30a9640c0000 pid=3172 /usr/bin/rm delete-file guuid=5fd75e93-1b00-0000-f2f7-30a93b0c0000 pid=3131->guuid=9dedf0a0-1b00-0000-f2f7-30a9640c0000 pid=3172 execve guuid=eaf46ca1-1b00-0000-f2f7-30a9660c0000 pid=3174 /usr/bin/wget net send-data write-file guuid=5fd75e93-1b00-0000-f2f7-30a93b0c0000 pid=3131->guuid=eaf46ca1-1b00-0000-f2f7-30a9660c0000 pid=3174 execve guuid=929ce4a7-1b00-0000-f2f7-30a9730c0000 pid=3187 /usr/bin/chmod guuid=5fd75e93-1b00-0000-f2f7-30a93b0c0000 pid=3131->guuid=929ce4a7-1b00-0000-f2f7-30a9730c0000 pid=3187 execve guuid=051f1ea8-1b00-0000-f2f7-30a9750c0000 pid=3189 /usr/bin/dash guuid=5fd75e93-1b00-0000-f2f7-30a93b0c0000 pid=3131->guuid=051f1ea8-1b00-0000-f2f7-30a9750c0000 pid=3189 clone guuid=b5089ca8-1b00-0000-f2f7-30a9780c0000 pid=3192 /usr/bin/rm delete-file guuid=5fd75e93-1b00-0000-f2f7-30a93b0c0000 pid=3131->guuid=b5089ca8-1b00-0000-f2f7-30a9780c0000 pid=3192 execve guuid=ea0fd8a8-1b00-0000-f2f7-30a9790c0000 pid=3193 /usr/bin/wget net send-data write-file guuid=5fd75e93-1b00-0000-f2f7-30a93b0c0000 pid=3131->guuid=ea0fd8a8-1b00-0000-f2f7-30a9790c0000 pid=3193 execve guuid=e1fe75ad-1b00-0000-f2f7-30a9800c0000 pid=3200 /usr/bin/chmod guuid=5fd75e93-1b00-0000-f2f7-30a93b0c0000 pid=3131->guuid=e1fe75ad-1b00-0000-f2f7-30a9800c0000 pid=3200 execve guuid=8894c3ad-1b00-0000-f2f7-30a9810c0000 pid=3201 /usr/bin/dash guuid=5fd75e93-1b00-0000-f2f7-30a93b0c0000 pid=3131->guuid=8894c3ad-1b00-0000-f2f7-30a9810c0000 pid=3201 clone guuid=4331c5ae-1b00-0000-f2f7-30a9830c0000 pid=3203 /usr/bin/rm delete-file guuid=5fd75e93-1b00-0000-f2f7-30a93b0c0000 pid=3131->guuid=4331c5ae-1b00-0000-f2f7-30a9830c0000 pid=3203 execve guuid=39d11daf-1b00-0000-f2f7-30a9840c0000 pid=3204 /usr/bin/wget net send-data write-file guuid=5fd75e93-1b00-0000-f2f7-30a93b0c0000 pid=3131->guuid=39d11daf-1b00-0000-f2f7-30a9840c0000 pid=3204 execve guuid=8484aeb3-1b00-0000-f2f7-30a9850c0000 pid=3205 /usr/bin/chmod guuid=5fd75e93-1b00-0000-f2f7-30a93b0c0000 pid=3131->guuid=8484aeb3-1b00-0000-f2f7-30a9850c0000 pid=3205 execve guuid=bad90eb4-1b00-0000-f2f7-30a9860c0000 pid=3206 /tmp/kitty.x86 delete-file guuid=5fd75e93-1b00-0000-f2f7-30a93b0c0000 pid=3131->guuid=bad90eb4-1b00-0000-f2f7-30a9860c0000 pid=3206 execve guuid=ba9e3cb4-1b00-0000-f2f7-30a9880c0000 pid=3208 /usr/bin/rm guuid=5fd75e93-1b00-0000-f2f7-30a93b0c0000 pid=3131->guuid=ba9e3cb4-1b00-0000-f2f7-30a9880c0000 pid=3208 execve guuid=809391b4-1b00-0000-f2f7-30a9890c0000 pid=3209 /usr/bin/wget net send-data write-file guuid=5fd75e93-1b00-0000-f2f7-30a93b0c0000 pid=3131->guuid=809391b4-1b00-0000-f2f7-30a9890c0000 pid=3209 execve guuid=51a75ebb-1b00-0000-f2f7-30a98a0c0000 pid=3210 /usr/bin/chmod guuid=5fd75e93-1b00-0000-f2f7-30a93b0c0000 pid=3131->guuid=51a75ebb-1b00-0000-f2f7-30a98a0c0000 pid=3210 execve guuid=9401afbb-1b00-0000-f2f7-30a98b0c0000 pid=3211 /tmp/kitty.x86_64 delete-file guuid=5fd75e93-1b00-0000-f2f7-30a93b0c0000 pid=3131->guuid=9401afbb-1b00-0000-f2f7-30a98b0c0000 pid=3211 execve guuid=9fe3cabb-1b00-0000-f2f7-30a98d0c0000 pid=3213 /usr/bin/rm guuid=5fd75e93-1b00-0000-f2f7-30a93b0c0000 pid=3131->guuid=9fe3cabb-1b00-0000-f2f7-30a98d0c0000 pid=3213 execve c36a0b40-e761-5342-9869-7d0f3e9f67ae 196.251.84.253:80 guuid=6d9c9b93-1b00-0000-f2f7-30a93c0c0000 pid=3132->c36a0b40-e761-5342-9869-7d0f3e9f67ae send: 138B guuid=d5405d9b-1b00-0000-f2f7-30a9560c0000 pid=3158->c36a0b40-e761-5342-9869-7d0f3e9f67ae send: 139B guuid=eaf46ca1-1b00-0000-f2f7-30a9660c0000 pid=3174->c36a0b40-e761-5342-9869-7d0f3e9f67ae send: 141B guuid=ea0fd8a8-1b00-0000-f2f7-30a9790c0000 pid=3193->c36a0b40-e761-5342-9869-7d0f3e9f67ae send: 142B guuid=39d11daf-1b00-0000-f2f7-30a9840c0000 pid=3204->c36a0b40-e761-5342-9869-7d0f3e9f67ae send: 138B guuid=41a42fb4-1b00-0000-f2f7-30a9870c0000 pid=3207 /tmp/kitty.x86 net send-data zombie guuid=bad90eb4-1b00-0000-f2f7-30a9860c0000 pid=3206->guuid=41a42fb4-1b00-0000-f2f7-30a9870c0000 pid=3207 clone eb9dca7b-d301-522e-83c7-8d6f291efc38 66.78.40.221:9080 guuid=41a42fb4-1b00-0000-f2f7-30a9870c0000 pid=3207->eb9dca7b-d301-522e-83c7-8d6f291efc38 send: 72B b0abba15-9a34-51cb-a2ff-3008f7e59616 208.67.222.222:53 guuid=41a42fb4-1b00-0000-f2f7-30a9870c0000 pid=3207->b0abba15-9a34-51cb-a2ff-3008f7e59616 send: 40B 6a6ce952-23cd-5c51-b461-6ca6a8c64225 1.0.0.1:53 guuid=41a42fb4-1b00-0000-f2f7-30a9870c0000 pid=3207->6a6ce952-23cd-5c51-b461-6ca6a8c64225 send: 40B guuid=809391b4-1b00-0000-f2f7-30a9890c0000 pid=3209->c36a0b40-e761-5342-9869-7d0f3e9f67ae send: 141B guuid=cf61c1bb-1b00-0000-f2f7-30a98c0c0000 pid=3212 /tmp/kitty.x86_64 net send-data zombie guuid=9401afbb-1b00-0000-f2f7-30a98b0c0000 pid=3211->guuid=cf61c1bb-1b00-0000-f2f7-30a98c0c0000 pid=3212 clone guuid=cf61c1bb-1b00-0000-f2f7-30a98c0c0000 pid=3212->eb9dca7b-d301-522e-83c7-8d6f291efc38 send: 37B guuid=cf61c1bb-1b00-0000-f2f7-30a98c0c0000 pid=3212->b0abba15-9a34-51cb-a2ff-3008f7e59616 send: 40B
Threat name:
Linux.Trojan.Multiverze
Status:
Malicious
First seen:
2025-08-23 19:25:51 UTC
File Type:
Text (Shell)
AV detection:
15 of 38 (39.47%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Modifies registry class
Suspicious use of SetWindowsHookEx
Enumerates physical storage devices
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh af384db55ea2aa72c039c7aa501032396113ca2a82ad8b251281a9a66efa03a1

(this sample)

  
Delivery method
Distributed via web download

Comments