MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 b5c1dd84c0cfaf7877b965e43183db2f4f47a489c8e45e45a66f14bf0d8f1c57. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 6


Intelligence 6 IOCs YARA 1 File information Comments

SHA256 hash: b5c1dd84c0cfaf7877b965e43183db2f4f47a489c8e45e45a66f14bf0d8f1c57
SHA3-384 hash: 7f18e8347861824987213ac7169ded85419a73b86e4c53e318f88971d648143e9fa002f52f7be4162d34bf2258e5b78e
SHA1 hash: 9cf8b576d58a652d169ba89c458be84913b32de0
MD5 hash: cf7686225bf83633bb24970f4100b8e7
humanhash: william-arkansas-batman-papa
File name:toto.sh
Download: download sample
File size:408 bytes
First seen:2026-02-03 19:59:12 UTC
Last seen:Never
File type: sh
MIME type:text/plain
ssdeep 12:CRSlR//YNR/hNI1hW+R/q6sRZDjRZnKF/DR2gr:CRKwbhNIfl2Del
TLSH T144E0A59F201BBB928C6BCF3AB25389A89106E3D51063CF5E6498197A7CC4680B455F99
Magika txt
Reporter abuse_ch
Tags:sh
URLMalware sample (SHA256 hash)SignatureTags
http://91.92.242.13/arm4fe75d377cef1bc619904f107a1686c914340532dab020a53d99de4ac68ced47a Miraiarm elf geofenced mirai opendir ua-wget USA
http://91.92.242.13/arm5cc1d3e676b7a1f8a2957593809741e305b53175206970f9e92aed74a20a077d8 Miraiarm elf geofenced mirai opendir ua-wget USA
http://91.92.242.13/arm627fe5bc4522c12b8bb62e916fcbc21de3e252621a06b1ca01c5ff04fb542cc9f Miraiarm elf geofenced mirai opendir ua-wget USA
http://91.92.242.13/arm789e1474abd79dbfed5c1f4f47150d8a1da3ff02c01f3ffd79aeafb1a7d0a21f3 Miraiarm elf geofenced mirai opendir ua-wget USA
http://91.92.242.13/mips2e3e7be8d40ee0b3614553d271ae3570c91e28e1c92a4cc87cfad2d74916f8c4 Miraielf geofenced mips mirai opendir ua-wget USA
http://91.92.242.13/mipsln/an/aelf ua-wget
http://91.92.242.13/x8628e9a3fee5786f96a02170a4959f7250101feaed551e27b146cd5f27a6b70f2c Miraielf geofenced mirai opendir ua-wget USA x86

Intelligence


File Origin
# of uploads :
1
# of downloads :
37
Origin country :
DE DE
Vendor Threat Intelligence
No detections
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
mirai
Result
Gathering data
Status:
terminated
Behavior Graph:
%3 guuid=2542ff40-1800-0000-cac8-3dfdc90b0000 pid=3017 /usr/bin/sudo guuid=b5b1c143-1800-0000-cac8-3dfdd00b0000 pid=3024 /tmp/sample.bin guuid=2542ff40-1800-0000-cac8-3dfdc90b0000 pid=3017->guuid=b5b1c143-1800-0000-cac8-3dfdd00b0000 pid=3024 execve guuid=f9a71644-1800-0000-cac8-3dfdd30b0000 pid=3027 /usr/bin/wget net send-data write-file guuid=b5b1c143-1800-0000-cac8-3dfdd00b0000 pid=3024->guuid=f9a71644-1800-0000-cac8-3dfdd30b0000 pid=3027 execve guuid=ea51dc50-1800-0000-cac8-3dfdf70b0000 pid=3063 /usr/bin/chmod guuid=b5b1c143-1800-0000-cac8-3dfdd00b0000 pid=3024->guuid=ea51dc50-1800-0000-cac8-3dfdf70b0000 pid=3063 execve guuid=5d9f9351-1800-0000-cac8-3dfdfb0b0000 pid=3067 /usr/bin/dash guuid=b5b1c143-1800-0000-cac8-3dfdd00b0000 pid=3024->guuid=5d9f9351-1800-0000-cac8-3dfdfb0b0000 pid=3067 clone guuid=dd90b351-1800-0000-cac8-3dfdfd0b0000 pid=3069 /usr/bin/wget net send-data write-file guuid=b5b1c143-1800-0000-cac8-3dfdd00b0000 pid=3024->guuid=dd90b351-1800-0000-cac8-3dfdfd0b0000 pid=3069 execve guuid=63d3a85c-1800-0000-cac8-3dfd110c0000 pid=3089 /usr/bin/chmod guuid=b5b1c143-1800-0000-cac8-3dfdd00b0000 pid=3024->guuid=63d3a85c-1800-0000-cac8-3dfd110c0000 pid=3089 execve guuid=0e02e25c-1800-0000-cac8-3dfd130c0000 pid=3091 /usr/bin/dash guuid=b5b1c143-1800-0000-cac8-3dfdd00b0000 pid=3024->guuid=0e02e25c-1800-0000-cac8-3dfd130c0000 pid=3091 clone guuid=b929675d-1800-0000-cac8-3dfd170c0000 pid=3095 /usr/bin/wget net send-data write-file guuid=b5b1c143-1800-0000-cac8-3dfdd00b0000 pid=3024->guuid=b929675d-1800-0000-cac8-3dfd170c0000 pid=3095 execve guuid=35b7a46a-1800-0000-cac8-3dfd3f0c0000 pid=3135 /usr/bin/chmod guuid=b5b1c143-1800-0000-cac8-3dfdd00b0000 pid=3024->guuid=35b7a46a-1800-0000-cac8-3dfd3f0c0000 pid=3135 execve guuid=bb93ea6a-1800-0000-cac8-3dfd410c0000 pid=3137 /usr/bin/dash guuid=b5b1c143-1800-0000-cac8-3dfdd00b0000 pid=3024->guuid=bb93ea6a-1800-0000-cac8-3dfd410c0000 pid=3137 clone guuid=9713f96b-1800-0000-cac8-3dfd450c0000 pid=3141 /usr/bin/wget net send-data write-file guuid=b5b1c143-1800-0000-cac8-3dfdd00b0000 pid=3024->guuid=9713f96b-1800-0000-cac8-3dfd450c0000 pid=3141 execve guuid=d8babd7a-1800-0000-cac8-3dfd650c0000 pid=3173 /usr/bin/chmod guuid=b5b1c143-1800-0000-cac8-3dfdd00b0000 pid=3024->guuid=d8babd7a-1800-0000-cac8-3dfd650c0000 pid=3173 execve guuid=d3a7087b-1800-0000-cac8-3dfd660c0000 pid=3174 /usr/bin/dash guuid=b5b1c143-1800-0000-cac8-3dfdd00b0000 pid=3024->guuid=d3a7087b-1800-0000-cac8-3dfd660c0000 pid=3174 clone guuid=ebffa17b-1800-0000-cac8-3dfd680c0000 pid=3176 /usr/bin/wget net send-data write-file guuid=b5b1c143-1800-0000-cac8-3dfdd00b0000 pid=3024->guuid=ebffa17b-1800-0000-cac8-3dfd680c0000 pid=3176 execve guuid=add80b89-1800-0000-cac8-3dfd760c0000 pid=3190 /usr/bin/chmod guuid=b5b1c143-1800-0000-cac8-3dfdd00b0000 pid=3024->guuid=add80b89-1800-0000-cac8-3dfd760c0000 pid=3190 execve guuid=1d406289-1800-0000-cac8-3dfd770c0000 pid=3191 /usr/bin/dash guuid=b5b1c143-1800-0000-cac8-3dfdd00b0000 pid=3024->guuid=1d406289-1800-0000-cac8-3dfd770c0000 pid=3191 clone guuid=dab37389-1800-0000-cac8-3dfd780c0000 pid=3192 /usr/bin/wget net send-data guuid=b5b1c143-1800-0000-cac8-3dfdd00b0000 pid=3024->guuid=dab37389-1800-0000-cac8-3dfd780c0000 pid=3192 execve guuid=5ecced90-1800-0000-cac8-3dfd7a0c0000 pid=3194 /usr/bin/chmod guuid=b5b1c143-1800-0000-cac8-3dfdd00b0000 pid=3024->guuid=5ecced90-1800-0000-cac8-3dfd7a0c0000 pid=3194 execve guuid=ae943e91-1800-0000-cac8-3dfd7b0c0000 pid=3195 /usr/bin/dash guuid=b5b1c143-1800-0000-cac8-3dfdd00b0000 pid=3024->guuid=ae943e91-1800-0000-cac8-3dfd7b0c0000 pid=3195 clone guuid=43915191-1800-0000-cac8-3dfd7c0c0000 pid=3196 /usr/bin/wget net send-data write-file guuid=b5b1c143-1800-0000-cac8-3dfdd00b0000 pid=3024->guuid=43915191-1800-0000-cac8-3dfd7c0c0000 pid=3196 execve guuid=da8e459b-1800-0000-cac8-3dfd950c0000 pid=3221 /usr/bin/chmod guuid=b5b1c143-1800-0000-cac8-3dfdd00b0000 pid=3024->guuid=da8e459b-1800-0000-cac8-3dfd950c0000 pid=3221 execve guuid=aa92899b-1800-0000-cac8-3dfd960c0000 pid=3222 /home/sandbox/x86 net guuid=b5b1c143-1800-0000-cac8-3dfdd00b0000 pid=3024->guuid=aa92899b-1800-0000-cac8-3dfd960c0000 pid=3222 execve guuid=a048bb9b-1800-0000-cac8-3dfd980c0000 pid=3224 /usr/bin/rm delete-file guuid=b5b1c143-1800-0000-cac8-3dfdd00b0000 pid=3024->guuid=a048bb9b-1800-0000-cac8-3dfd980c0000 pid=3224 execve 2e67b43e-b793-5791-9440-775ab595a903 91.92.242.13:80 guuid=f9a71644-1800-0000-cac8-3dfdd30b0000 pid=3027->2e67b43e-b793-5791-9440-775ab595a903 send: 131B guuid=dd90b351-1800-0000-cac8-3dfdfd0b0000 pid=3069->2e67b43e-b793-5791-9440-775ab595a903 send: 131B guuid=b929675d-1800-0000-cac8-3dfd170c0000 pid=3095->2e67b43e-b793-5791-9440-775ab595a903 send: 131B guuid=9713f96b-1800-0000-cac8-3dfd450c0000 pid=3141->2e67b43e-b793-5791-9440-775ab595a903 send: 131B guuid=ebffa17b-1800-0000-cac8-3dfd680c0000 pid=3176->2e67b43e-b793-5791-9440-775ab595a903 send: 131B guuid=dab37389-1800-0000-cac8-3dfd780c0000 pid=3192->2e67b43e-b793-5791-9440-775ab595a903 send: 132B guuid=43915191-1800-0000-cac8-3dfd7c0c0000 pid=3196->2e67b43e-b793-5791-9440-775ab595a903 send: 130B 8b0a01dc-0728-52c1-8024-c4ba7801b8d6 8.8.8.8:53 guuid=aa92899b-1800-0000-cac8-3dfd960c0000 pid=3222->8b0a01dc-0728-52c1-8024-c4ba7801b8d6 con guuid=14e7ae9b-1800-0000-cac8-3dfd970c0000 pid=3223 /home/sandbox/x86 net send-data zombie guuid=aa92899b-1800-0000-cac8-3dfd960c0000 pid=3222->guuid=14e7ae9b-1800-0000-cac8-3dfd970c0000 pid=3223 clone guuid=14e7ae9b-1800-0000-cac8-3dfd970c0000 pid=3223->8b0a01dc-0728-52c1-8024-c4ba7801b8d6 con 83708861-7158-5fe5-bbac-31d99923e768 178.16.54.17:65521 guuid=14e7ae9b-1800-0000-cac8-3dfd970c0000 pid=3223->83708861-7158-5fe5-bbac-31d99923e768 send: 11B
Verdict:
Malicious
Threat:
Trojan-Downloader.Shell.Agent
Threat name:
Script-Shell.Downloader.Heuristic
Status:
Malicious
First seen:
2026-02-03 20:00:39 UTC
File Type:
Text (Shell)
AV detection:
8 of 36 (22.22%)
Threat level:
  2/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Modifies registry class
Suspicious use of SetWindowsHookEx
Enumerates physical storage devices
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:MAL_Linux_IoT_MultiArch_BotnetLoader_Generic
Author:Anish Bogati
Description:Technique-based detection of IoT/Linux botnet loader shell scripts downloading binaries from numeric IPs, chmodding, and executing multi-architecture payloads
Reference:MalwareBazaar sample lilin.sh

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

sh b5c1dd84c0cfaf7877b965e43183db2f4f47a489c8e45e45a66f14bf0d8f1c57

(this sample)

  
Delivery method
Distributed via web download

Comments