MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 b95d66b701916b2a11cd0cf21e3e4d87d3bd31ef45f910930cecc42b9a3c0b4a. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: b95d66b701916b2a11cd0cf21e3e4d87d3bd31ef45f910930cecc42b9a3c0b4a
SHA3-384 hash: 71e6e29a22d0427eef84929a3c0f4a0380929f5251bf0143f7c8170a7c609facd5ef6d7479b786f29243c8c31f1513f3
SHA1 hash: d95aca70184eac04b98e4dbd112c5823e2a90b70
MD5 hash: 4a735e6fa59d48a40701bf11c5bc7c4d
humanhash: two-six-mobile-uranus
File name:wget.sh
Download: download sample
Signature Mirai
File size:492 bytes
First seen:2026-03-25 15:27:00 UTC
Last seen:Never
File type: sh
MIME type:text/x-shellscript
ssdeep 6:hPSYtqXDRvAwAkMFNyhpOx0/F65LrsY6XCMSYeJwInSc6Xjy5rAOhVUE:Jns6w6NyHe0desYKCMSYeJB9KW5pZ
TLSH T173F059CE06903A5040CDCA1F7393894E1005C3CD11DF93C83DED1A27BA50AECF189EA8
TrID 70.0% (.SH) Linux/UNIX shell script (7000/1)
30.0% (.) Unix-like shebang (var.3) (gen) (3000/1)
Magika shell
Reporter abuse_ch
Tags:sh
URLMalware sample (SHA256 hash)SignatureTags
http://91.92.241.94/arm543b14f66dd5aab907c0937502ff0f4655066534799b22343198c1778757f311c Miraiarm elf mirai ua-wget
http://91.92.241.94/arm717c5f13da5b62b155dd973f9062f12061687cc44ee9150d42871005ab5b9c4b5 Miraiarm elf mirai ua-wget
http://91.92.241.94/mips04e21cacf2978094e4d6874abb7ecd61af394570a744d3fc50309eb9cc74a9ae Miraielf gafgyt mips mirai ua-wget
http://91.92.241.94/mipsel32e4725e4ca7048ac4bd253155778a4ec657c55a5586aa90eda49409a3e7e8d8 Miraielf mirai ua-wget

Intelligence


File Origin
# of uploads :
1
# of downloads :
74
Origin country :
DE DE
Vendor Threat Intelligence
No detections
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
busybox mirai
Result
Gathering data
Verdict:
Malicious
File Type:
unix shell
Detections:
HEUR:Trojan-Downloader.Shell.Agent.p
Status:
terminated
Behavior Graph:
%3 guuid=ff331419-1800-0000-d9d1-078c8e0b0000 pid=2958 /usr/bin/sudo guuid=4988c31a-1800-0000-d9d1-078c930b0000 pid=2963 /tmp/sample.bin guuid=ff331419-1800-0000-d9d1-078c8e0b0000 pid=2958->guuid=4988c31a-1800-0000-d9d1-078c930b0000 pid=2963 execve guuid=5f9d0d1b-1800-0000-d9d1-078c950b0000 pid=2965 /usr/bin/rm guuid=4988c31a-1800-0000-d9d1-078c930b0000 pid=2963->guuid=5f9d0d1b-1800-0000-d9d1-078c950b0000 pid=2965 execve guuid=3280671b-1800-0000-d9d1-078c970b0000 pid=2967 /usr/bin/rm guuid=4988c31a-1800-0000-d9d1-078c930b0000 pid=2963->guuid=3280671b-1800-0000-d9d1-078c970b0000 pid=2967 execve guuid=eb09c31b-1800-0000-d9d1-078c980b0000 pid=2968 /usr/bin/rm guuid=4988c31a-1800-0000-d9d1-078c930b0000 pid=2963->guuid=eb09c31b-1800-0000-d9d1-078c980b0000 pid=2968 execve guuid=7a291c1c-1800-0000-d9d1-078c990b0000 pid=2969 /usr/bin/rm guuid=4988c31a-1800-0000-d9d1-078c930b0000 pid=2963->guuid=7a291c1c-1800-0000-d9d1-078c990b0000 pid=2969 execve guuid=6646751c-1800-0000-d9d1-078c9a0b0000 pid=2970 /usr/bin/rm guuid=4988c31a-1800-0000-d9d1-078c930b0000 pid=2963->guuid=6646751c-1800-0000-d9d1-078c9a0b0000 pid=2970 execve guuid=14a3c31c-1800-0000-d9d1-078c9c0b0000 pid=2972 /usr/bin/rm guuid=4988c31a-1800-0000-d9d1-078c930b0000 pid=2963->guuid=14a3c31c-1800-0000-d9d1-078c9c0b0000 pid=2972 execve guuid=78f4381d-1800-0000-d9d1-078c9d0b0000 pid=2973 /usr/bin/rm guuid=4988c31a-1800-0000-d9d1-078c930b0000 pid=2963->guuid=78f4381d-1800-0000-d9d1-078c9d0b0000 pid=2973 execve guuid=7974b01d-1800-0000-d9d1-078c9e0b0000 pid=2974 /usr/bin/cp guuid=4988c31a-1800-0000-d9d1-078c930b0000 pid=2963->guuid=7974b01d-1800-0000-d9d1-078c9e0b0000 pid=2974 execve guuid=a32e4024-1800-0000-d9d1-078cb10b0000 pid=2993 /usr/bin/busybox net send-data write-file guuid=4988c31a-1800-0000-d9d1-078c930b0000 pid=2963->guuid=a32e4024-1800-0000-d9d1-078cb10b0000 pid=2993 execve guuid=31936830-1800-0000-d9d1-078ccd0b0000 pid=3021 /usr/bin/chmod guuid=4988c31a-1800-0000-d9d1-078c930b0000 pid=2963->guuid=31936830-1800-0000-d9d1-078ccd0b0000 pid=3021 execve guuid=1cb7ac30-1800-0000-d9d1-078ccf0b0000 pid=3023 /usr/bin/dash guuid=4988c31a-1800-0000-d9d1-078c930b0000 pid=2963->guuid=1cb7ac30-1800-0000-d9d1-078ccf0b0000 pid=3023 clone guuid=19a33831-1800-0000-d9d1-078cd20b0000 pid=3026 /usr/bin/busybox net send-data write-file guuid=4988c31a-1800-0000-d9d1-078c930b0000 pid=2963->guuid=19a33831-1800-0000-d9d1-078cd20b0000 pid=3026 execve guuid=aaee333e-1800-0000-d9d1-078cff0b0000 pid=3071 /usr/bin/chmod guuid=4988c31a-1800-0000-d9d1-078c930b0000 pid=2963->guuid=aaee333e-1800-0000-d9d1-078cff0b0000 pid=3071 execve guuid=9e5f6b3e-1800-0000-d9d1-078c010c0000 pid=3073 /usr/bin/dash guuid=4988c31a-1800-0000-d9d1-078c930b0000 pid=2963->guuid=9e5f6b3e-1800-0000-d9d1-078c010c0000 pid=3073 clone guuid=0cbfee3e-1800-0000-d9d1-078c040c0000 pid=3076 /usr/bin/busybox net send-data write-file guuid=4988c31a-1800-0000-d9d1-078c930b0000 pid=2963->guuid=0cbfee3e-1800-0000-d9d1-078c040c0000 pid=3076 execve guuid=f6ef8a4b-1800-0000-d9d1-078c2c0c0000 pid=3116 /usr/bin/chmod guuid=4988c31a-1800-0000-d9d1-078c930b0000 pid=2963->guuid=f6ef8a4b-1800-0000-d9d1-078c2c0c0000 pid=3116 execve guuid=3ce8c84b-1800-0000-d9d1-078c2e0c0000 pid=3118 /usr/bin/dash guuid=4988c31a-1800-0000-d9d1-078c930b0000 pid=2963->guuid=3ce8c84b-1800-0000-d9d1-078c2e0c0000 pid=3118 clone guuid=9e92c84c-1800-0000-d9d1-078c330c0000 pid=3123 /usr/bin/busybox net send-data write-file guuid=4988c31a-1800-0000-d9d1-078c930b0000 pid=2963->guuid=9e92c84c-1800-0000-d9d1-078c330c0000 pid=3123 execve guuid=6b8b165c-1800-0000-d9d1-078c630c0000 pid=3171 /usr/bin/chmod guuid=4988c31a-1800-0000-d9d1-078c930b0000 pid=2963->guuid=6b8b165c-1800-0000-d9d1-078c630c0000 pid=3171 execve guuid=67d26f5c-1800-0000-d9d1-078c650c0000 pid=3173 /usr/bin/dash guuid=4988c31a-1800-0000-d9d1-078c930b0000 pid=2963->guuid=67d26f5c-1800-0000-d9d1-078c650c0000 pid=3173 clone 59a44c65-0739-58c2-b090-c9afea904369 91.92.241.94:80 guuid=a32e4024-1800-0000-d9d1-078cb10b0000 pid=2993->59a44c65-0739-58c2-b090-c9afea904369 send: 79B guuid=19a33831-1800-0000-d9d1-078cd20b0000 pid=3026->59a44c65-0739-58c2-b090-c9afea904369 send: 79B guuid=0cbfee3e-1800-0000-d9d1-078c040c0000 pid=3076->59a44c65-0739-58c2-b090-c9afea904369 send: 79B guuid=9e92c84c-1800-0000-d9d1-078c330c0000 pid=3123->59a44c65-0739-58c2-b090-c9afea904369 send: 81B
Verdict:
Malicious
Threat:
Trojan-Downloader.Shell.Agent
Threat name:
Document-HTML.Hacktool.Heuristic
Status:
Malicious
First seen:
2026-03-25 15:27:27 UTC
File Type:
Text (Shell)
AV detection:
8 of 36 (22.22%)
Threat level:
  1/5
Result
Malware family:
n/a
Score:
  9/10
Tags:
antivm defense_evasion discovery linux
Behaviour
Reads runtime system information
System Network Configuration Discovery
Writes file to tmp directory
Changes its process name
Checks CPU configuration
Reads system network configuration
Enumerates active TCP sockets
Enumerates running processes
Reads list of loaded kernel modules
File and Directory Permissions Modification
Executes dropped EXE
Renames itself
Unexpected DNS network traffic destination
Contacts a large (28801) amount of remote hosts
Creates a large amount of network flows
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh b95d66b701916b2a11cd0cf21e3e4d87d3bd31ef45f910930cecc42b9a3c0b4a

(this sample)

  
Delivery method
Distributed via web download

Comments