MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 b15b620d27f7d00cfb31ac26c2c4a07c19bcc9e1df04f1f7c6b25d7c0c3f551d. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: b15b620d27f7d00cfb31ac26c2c4a07c19bcc9e1df04f1f7c6b25d7c0c3f551d
SHA3-384 hash: 3f6085777b16134feea24a609d672eaeb6eef9bcd50c8fd7d0fb412b11ca5b9873716006ee6d858b89201a135b0f155b
SHA1 hash: 651101af3560bd60bf5a62515451a53de64939d7
MD5 hash: dc4692d2dc2c05bb0f586daf2b4c27b7
humanhash: michigan-nevada-friend-cup
File name:c.sh
Download: download sample
Signature Mirai
File size:732 bytes
First seen:2026-02-01 06:50:18 UTC
Last seen:Never
File type: sh
MIME type:text/plain
ssdeep 12:3J3WVHP3Gv35WVHtRxeC5WVH8NIjlTM5WVH9iKl2PC5WVHmn5WVHpF5WVHk9lC5D:3J3e3GvA+CJNIpI/KlxNCdKnxP67Trqn
TLSH T13B01DADD41652FB29324CF5CFA77802C5146D0D0F7E35A99E26A04384CE834BB525BE7
Magika shell
Reporter abuse_ch
Tags:mirai sh
URLMalware sample (SHA256 hash)SignatureTags
http://94.156.152.67/bins/parm48967d1600dc0ad2effcdeda7eae9a666a5b1090eb07a75c754ef71659bec5cbc Miraielf mirai ua-wget
http://94.156.152.67/bins/parm5249bc7c5f69ca45551a7b7c35076a8a63b9c6de3d5228ca3006bd92583351fcf Miraiarm elf geofenced mirai opendir ua-wget USA
http://94.156.152.67/bins/parm66ba731baef133d63bdb492b29f8f148ffde09a43e8638bb09ac2d12632239978 Miraiarm elf geofenced mirai opendir ua-wget USA
http://94.156.152.67/bins/parm702618f3738f979bad10a6cb98bfaf9a45e200394ef955972c0ed9a3e567d4873 Miraiarm elf geofenced mirai opendir ua-wget USA
http://94.156.152.67/bins/pm68k354c87c3d98f170852b5857bba1cb6a92adba034222b9558b3869f3f0149bc26 Miraielf mirai
http://94.156.152.67/bins/psh4n/an/aelf mirai
http://94.156.152.67/bins/pmipsn/an/aelf geofenced mips mirai opendir ua-wget USA
http://94.156.152.67/bins/pmpsln/an/aelf geofenced mips mirai opendir ua-wget USA
http://94.156.152.67/bins/pppc6e675c36a690663707594e209383561ca3dd8e732e623bd9339f3819561cb00a Miraielf mirai
http://94.156.152.67/bins/px86n/an/aelf geofenced mirai opendir ua-wget USA x86
http://94.156.152.67/bins/pspcb8d3fa58b5c2de4ae7ac3ab396ce12f3db1fdcd1471115dcfaed4acb996f1d39 Miraielf mirai

Intelligence


File Origin
# of uploads :
1
# of downloads :
45
Origin country :
DE DE
Vendor Threat Intelligence
Gathering data
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
mirai
Verdict:
Malicious
File Type:
text
First seen:
2026-02-01T00:25:00Z UTC
Last seen:
2026-02-02T02:20:00Z UTC
Hits:
~10
Detections:
HEUR:Trojan-Downloader.Shell.Agent.a
Status:
terminated
Behavior Graph:
%3 guuid=0a575b33-1700-0000-acba-e539920e0000 pid=3730 /usr/bin/sudo guuid=86610935-1700-0000-acba-e5399c0e0000 pid=3740 /tmp/sample.bin guuid=0a575b33-1700-0000-acba-e539920e0000 pid=3730->guuid=86610935-1700-0000-acba-e5399c0e0000 pid=3740 execve guuid=e4843c35-1700-0000-acba-e5399e0e0000 pid=3742 /usr/bin/curl net send-data guuid=86610935-1700-0000-acba-e5399c0e0000 pid=3740->guuid=e4843c35-1700-0000-acba-e5399e0e0000 pid=3742 execve guuid=570b993f-1700-0000-acba-e539bb0e0000 pid=3771 /usr/bin/chmod guuid=86610935-1700-0000-acba-e5399c0e0000 pid=3740->guuid=570b993f-1700-0000-acba-e539bb0e0000 pid=3771 execve guuid=705c1d40-1700-0000-acba-e539bd0e0000 pid=3773 /usr/bin/dash guuid=86610935-1700-0000-acba-e5399c0e0000 pid=3740->guuid=705c1d40-1700-0000-acba-e539bd0e0000 pid=3773 clone guuid=aec03640-1700-0000-acba-e539be0e0000 pid=3774 /usr/bin/curl net send-data guuid=86610935-1700-0000-acba-e5399c0e0000 pid=3740->guuid=aec03640-1700-0000-acba-e539be0e0000 pid=3774 execve guuid=c09ff64b-1700-0000-acba-e539eb0e0000 pid=3819 /usr/bin/chmod guuid=86610935-1700-0000-acba-e5399c0e0000 pid=3740->guuid=c09ff64b-1700-0000-acba-e539eb0e0000 pid=3819 execve guuid=fa2e374c-1700-0000-acba-e539ee0e0000 pid=3822 /usr/bin/dash guuid=86610935-1700-0000-acba-e5399c0e0000 pid=3740->guuid=fa2e374c-1700-0000-acba-e539ee0e0000 pid=3822 clone guuid=42d5434c-1700-0000-acba-e539ef0e0000 pid=3823 /usr/bin/curl net send-data guuid=86610935-1700-0000-acba-e5399c0e0000 pid=3740->guuid=42d5434c-1700-0000-acba-e539ef0e0000 pid=3823 execve guuid=2d6dea59-1700-0000-acba-e5392a0f0000 pid=3882 /usr/bin/chmod guuid=86610935-1700-0000-acba-e5399c0e0000 pid=3740->guuid=2d6dea59-1700-0000-acba-e5392a0f0000 pid=3882 execve guuid=3a1d3f5a-1700-0000-acba-e5392c0f0000 pid=3884 /usr/bin/dash guuid=86610935-1700-0000-acba-e5399c0e0000 pid=3740->guuid=3a1d3f5a-1700-0000-acba-e5392c0f0000 pid=3884 clone guuid=778e465a-1700-0000-acba-e5392d0f0000 pid=3885 /usr/bin/curl net send-data guuid=86610935-1700-0000-acba-e5399c0e0000 pid=3740->guuid=778e465a-1700-0000-acba-e5392d0f0000 pid=3885 execve guuid=a218726b-1700-0000-acba-e539550f0000 pid=3925 /usr/bin/chmod guuid=86610935-1700-0000-acba-e5399c0e0000 pid=3740->guuid=a218726b-1700-0000-acba-e539550f0000 pid=3925 execve guuid=1a92ee6b-1700-0000-acba-e539580f0000 pid=3928 /usr/bin/dash guuid=86610935-1700-0000-acba-e5399c0e0000 pid=3740->guuid=1a92ee6b-1700-0000-acba-e539580f0000 pid=3928 clone guuid=98ef066c-1700-0000-acba-e539590f0000 pid=3929 /usr/bin/curl net send-data guuid=86610935-1700-0000-acba-e5399c0e0000 pid=3740->guuid=98ef066c-1700-0000-acba-e539590f0000 pid=3929 execve guuid=99098b80-1700-0000-acba-e539920f0000 pid=3986 /usr/bin/chmod guuid=86610935-1700-0000-acba-e5399c0e0000 pid=3740->guuid=99098b80-1700-0000-acba-e539920f0000 pid=3986 execve guuid=39280381-1700-0000-acba-e539940f0000 pid=3988 /usr/bin/dash guuid=86610935-1700-0000-acba-e5399c0e0000 pid=3740->guuid=39280381-1700-0000-acba-e539940f0000 pid=3988 clone guuid=743b1481-1700-0000-acba-e539950f0000 pid=3989 /usr/bin/curl net send-data guuid=86610935-1700-0000-acba-e5399c0e0000 pid=3740->guuid=743b1481-1700-0000-acba-e539950f0000 pid=3989 execve guuid=c857be8f-1700-0000-acba-e539bf0f0000 pid=4031 /usr/bin/chmod guuid=86610935-1700-0000-acba-e5399c0e0000 pid=3740->guuid=c857be8f-1700-0000-acba-e539bf0f0000 pid=4031 execve guuid=e8be1e90-1700-0000-acba-e539c00f0000 pid=4032 /usr/bin/dash guuid=86610935-1700-0000-acba-e5399c0e0000 pid=3740->guuid=e8be1e90-1700-0000-acba-e539c00f0000 pid=4032 clone guuid=01b62d90-1700-0000-acba-e539c20f0000 pid=4034 /usr/bin/curl net send-data guuid=86610935-1700-0000-acba-e5399c0e0000 pid=3740->guuid=01b62d90-1700-0000-acba-e539c20f0000 pid=4034 execve guuid=632aa1a1-1700-0000-acba-e539f10f0000 pid=4081 /usr/bin/chmod guuid=86610935-1700-0000-acba-e5399c0e0000 pid=3740->guuid=632aa1a1-1700-0000-acba-e539f10f0000 pid=4081 execve guuid=4dce0ea2-1700-0000-acba-e539f20f0000 pid=4082 /usr/bin/dash guuid=86610935-1700-0000-acba-e5399c0e0000 pid=3740->guuid=4dce0ea2-1700-0000-acba-e539f20f0000 pid=4082 clone guuid=4b5d1aa2-1700-0000-acba-e539f40f0000 pid=4084 /usr/bin/curl net send-data guuid=86610935-1700-0000-acba-e5399c0e0000 pid=3740->guuid=4b5d1aa2-1700-0000-acba-e539f40f0000 pid=4084 execve guuid=7f2066ae-1700-0000-acba-e53916100000 pid=4118 /usr/bin/chmod guuid=86610935-1700-0000-acba-e5399c0e0000 pid=3740->guuid=7f2066ae-1700-0000-acba-e53916100000 pid=4118 execve guuid=e1cbd8ae-1700-0000-acba-e53918100000 pid=4120 /usr/bin/dash guuid=86610935-1700-0000-acba-e5399c0e0000 pid=3740->guuid=e1cbd8ae-1700-0000-acba-e53918100000 pid=4120 clone guuid=ea88e8ae-1700-0000-acba-e53919100000 pid=4121 /usr/bin/curl net send-data guuid=86610935-1700-0000-acba-e5399c0e0000 pid=3740->guuid=ea88e8ae-1700-0000-acba-e53919100000 pid=4121 execve guuid=a47ea8bb-1700-0000-acba-e5393f100000 pid=4159 /usr/bin/chmod guuid=86610935-1700-0000-acba-e5399c0e0000 pid=3740->guuid=a47ea8bb-1700-0000-acba-e5393f100000 pid=4159 execve guuid=81dd44bc-1700-0000-acba-e53940100000 pid=4160 /usr/bin/dash guuid=86610935-1700-0000-acba-e5399c0e0000 pid=3740->guuid=81dd44bc-1700-0000-acba-e53940100000 pid=4160 clone guuid=463f56bc-1700-0000-acba-e53942100000 pid=4162 /usr/bin/curl net send-data guuid=86610935-1700-0000-acba-e5399c0e0000 pid=3740->guuid=463f56bc-1700-0000-acba-e53942100000 pid=4162 execve guuid=08b93bca-1700-0000-acba-e5396a100000 pid=4202 /usr/bin/chmod guuid=86610935-1700-0000-acba-e5399c0e0000 pid=3740->guuid=08b93bca-1700-0000-acba-e5396a100000 pid=4202 execve guuid=c2d481ca-1700-0000-acba-e5396c100000 pid=4204 /usr/bin/dash guuid=86610935-1700-0000-acba-e5399c0e0000 pid=3740->guuid=c2d481ca-1700-0000-acba-e5396c100000 pid=4204 clone guuid=cf828bca-1700-0000-acba-e5396d100000 pid=4205 /usr/bin/curl net send-data guuid=86610935-1700-0000-acba-e5399c0e0000 pid=3740->guuid=cf828bca-1700-0000-acba-e5396d100000 pid=4205 execve guuid=5dfd62de-1700-0000-acba-e539b2100000 pid=4274 /usr/bin/chmod guuid=86610935-1700-0000-acba-e5399c0e0000 pid=3740->guuid=5dfd62de-1700-0000-acba-e539b2100000 pid=4274 execve guuid=f496b7de-1700-0000-acba-e539b4100000 pid=4276 /usr/bin/dash guuid=86610935-1700-0000-acba-e5399c0e0000 pid=3740->guuid=f496b7de-1700-0000-acba-e539b4100000 pid=4276 clone guuid=5599c8de-1700-0000-acba-e539b5100000 pid=4277 /usr/bin/rm delete-file guuid=86610935-1700-0000-acba-e5399c0e0000 pid=3740->guuid=5599c8de-1700-0000-acba-e539b5100000 pid=4277 execve a0cce8c1-8de3-5e77-97c2-8db8bf5fa654 94.156.152.67:80 guuid=e4843c35-1700-0000-acba-e5399e0e0000 pid=3742->a0cce8c1-8de3-5e77-97c2-8db8bf5fa654 send: 87B guuid=aec03640-1700-0000-acba-e539be0e0000 pid=3774->a0cce8c1-8de3-5e77-97c2-8db8bf5fa654 send: 87B guuid=42d5434c-1700-0000-acba-e539ef0e0000 pid=3823->a0cce8c1-8de3-5e77-97c2-8db8bf5fa654 send: 87B guuid=778e465a-1700-0000-acba-e5392d0f0000 pid=3885->a0cce8c1-8de3-5e77-97c2-8db8bf5fa654 send: 87B guuid=98ef066c-1700-0000-acba-e539590f0000 pid=3929->a0cce8c1-8de3-5e77-97c2-8db8bf5fa654 send: 87B guuid=743b1481-1700-0000-acba-e539950f0000 pid=3989->a0cce8c1-8de3-5e77-97c2-8db8bf5fa654 send: 86B guuid=01b62d90-1700-0000-acba-e539c20f0000 pid=4034->a0cce8c1-8de3-5e77-97c2-8db8bf5fa654 send: 87B guuid=4b5d1aa2-1700-0000-acba-e539f40f0000 pid=4084->a0cce8c1-8de3-5e77-97c2-8db8bf5fa654 send: 87B guuid=ea88e8ae-1700-0000-acba-e53919100000 pid=4121->a0cce8c1-8de3-5e77-97c2-8db8bf5fa654 send: 86B guuid=463f56bc-1700-0000-acba-e53942100000 pid=4162->a0cce8c1-8de3-5e77-97c2-8db8bf5fa654 send: 86B guuid=cf828bca-1700-0000-acba-e5396d100000 pid=4205->a0cce8c1-8de3-5e77-97c2-8db8bf5fa654 send: 86B
Verdict:
Malicious
Threat:
Trojan-Downloader.Shell.Agent
Threat name:
Win32.Trojan.Vigorf
Status:
Malicious
First seen:
2026-02-01 05:19:20 UTC
File Type:
Text (Shell)
AV detection:
11 of 36 (30.56%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Modifies registry class
Suspicious use of SetWindowsHookEx
Enumerates physical storage devices
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh b15b620d27f7d00cfb31ac26c2c4a07c19bcc9e1df04f1f7c6b25d7c0c3f551d

(this sample)

  
Delivery method
Distributed via web download

Comments