MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 bf2a44b6c4e5d851d5dacd0d0d34e98bd3051eed36c02f638df15aa96f74df78. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 5


Intelligence 5 IOCs YARA File information Comments

SHA256 hash: bf2a44b6c4e5d851d5dacd0d0d34e98bd3051eed36c02f638df15aa96f74df78
SHA3-384 hash: 798c266b8c9b62e978aaecc957e1c08af38bac0d6b5fbef695a8c6d3e290f5b5dae7a9579d83b2bbeffdcf700e31458b
SHA1 hash: a1aeb21a13297201c2c07615365f2b6f07ce77df
MD5 hash: 2debdbcc35f082c1d911364218a6065e
humanhash: south-mountain-november-diet
File name:w.sh
Download: download sample
Signature Mirai
File size:918 bytes
First seen:2025-08-23 06:14:21 UTC
Last seen:2025-08-23 09:55:25 UTC
File type: sh
MIME type:text/plain
ssdeep 12:oL7CY+crNIl5040LKEK+OFo3jMAZTfeSOAXtTYARZ7Vn:7YRNI7eKj+IQjJT2lQtU+Dn
TLSH T1681112CD1A72773645484F69B2668C489025ADD031D90F5EEE8E0CF6DDD9D107236E7C
Magika txt
Reporter abuse_ch
Tags:mirai sh
URLMalware sample (SHA256 hash)SignatureTags
http://149.102.155.8/systemcl/arma2812bf91c1836b0749615f8c92f49b055ed1152a0cfcb03cffb4473388ae1f9 Mirai32-bit elf mirai Mozi
http://149.102.155.8/systemcl/arm5467ca3ecdb388a31f9687f3f93134ae992fbfbe2936cfbd700c3d198b3b65ecb Miraiarm elf geofenced mirai ua-wget USA
http://149.102.155.8/systemcl/arm67a4627901da5e02ceacaf688cc103b4944a3cf75b4f1f4316ee638893eaa4104 Miraiarm elf geofenced mirai ua-wget USA
http://149.102.155.8/systemcl/arm71745a1dc09e108e719186017f4d6f10e1835aa4ba3f74b50b8394e3268c66524 Miraiarm elf geofenced mirai ua-wget USA
http://149.102.155.8/systemcl/m68k19abfca0200531ee5ddc2dd7bc4454af84d9ffe0ef2e12cd2a54fc828ebdc659 Miraielf geofenced m68k mirai ua-wget USA
http://149.102.155.8/systemcl/mipsad42066092b60784e1579fb3742cf3a41450dacc13b254e9c3a0c5b84aaf0db4 Mirai32-bit elf mirai Mozi
http://149.102.155.8/systemcl/mpsl7365564e3fc5bc60caa91eb8b6b87a6d8da423389be87134899fcd0caaeb3242 Miraielf geofenced mips mirai ua-wget USA
http://149.102.155.8/systemcl/ppcabfd19ac36a02a8d3552a65a6e023b7499af427f7ea558cbc5064b8475bd955e Miraielf geofenced mirai PowerPC ua-wget USA
http://149.102.155.8/systemcl/sh4b5d5a320320766751e9a1e31bc6ff850196e0c3f0b5baee15eee600b8a3cdae2 Miraielf geofenced mirai SuperH ua-wget USA
http://149.102.155.8/systemcl/spc2b4e44a8a37c63ce0a2c007bb22d903ae9d13b643b6b556f4d15199926cdd54c Miraielf geofenced mirai sparc ua-wget USA
http://149.102.155.8/systemcl/x862e9b4bb064c078485eab38389da45cfecd1f865d77cd5c199ae3c2fe195daf72 Mirai32-bit elf mirai Mozi
http://149.102.155.8/systemcl/x86_6447a0fa2b9aa3ebdb48324d5ad43903187a528176193716db81991191b3d3b230 Miraiarc elf geofenced mirai ua-wget USA

Intelligence


File Origin
# of uploads :
2
# of downloads :
23
Origin country :
DE DE
Vendor Threat Intelligence
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
busybox evasive mirai
Status:
terminated
Behavior Graph:
%3 guuid=0bc2b9bf-1a00-0000-b602-111e170a0000 pid=2583 /usr/bin/sudo guuid=d65646c2-1a00-0000-b602-111e1f0a0000 pid=2591 /tmp/sample.bin guuid=0bc2b9bf-1a00-0000-b602-111e170a0000 pid=2583->guuid=d65646c2-1a00-0000-b602-111e1f0a0000 pid=2591 execve guuid=90e19dc2-1a00-0000-b602-111e210a0000 pid=2593 /usr/bin/busybox net send-data write-file guuid=d65646c2-1a00-0000-b602-111e1f0a0000 pid=2591->guuid=90e19dc2-1a00-0000-b602-111e210a0000 pid=2593 execve guuid=8d6e98c7-1a00-0000-b602-111e310a0000 pid=2609 /usr/bin/chmod guuid=d65646c2-1a00-0000-b602-111e1f0a0000 pid=2591->guuid=8d6e98c7-1a00-0000-b602-111e310a0000 pid=2609 execve guuid=c489e8c7-1a00-0000-b602-111e330a0000 pid=2611 /usr/bin/dash guuid=d65646c2-1a00-0000-b602-111e1f0a0000 pid=2591->guuid=c489e8c7-1a00-0000-b602-111e330a0000 pid=2611 clone guuid=712ab9c9-1a00-0000-b602-111e3a0a0000 pid=2618 /usr/bin/busybox net send-data write-file guuid=d65646c2-1a00-0000-b602-111e1f0a0000 pid=2591->guuid=712ab9c9-1a00-0000-b602-111e3a0a0000 pid=2618 execve guuid=60aa81ce-1a00-0000-b602-111e480a0000 pid=2632 /usr/bin/chmod guuid=d65646c2-1a00-0000-b602-111e1f0a0000 pid=2591->guuid=60aa81ce-1a00-0000-b602-111e480a0000 pid=2632 execve guuid=fc57e4ce-1a00-0000-b602-111e4a0a0000 pid=2634 /usr/bin/dash guuid=d65646c2-1a00-0000-b602-111e1f0a0000 pid=2591->guuid=fc57e4ce-1a00-0000-b602-111e4a0a0000 pid=2634 clone guuid=2caf6ad0-1a00-0000-b602-111e4f0a0000 pid=2639 /usr/bin/busybox net send-data write-file guuid=d65646c2-1a00-0000-b602-111e1f0a0000 pid=2591->guuid=2caf6ad0-1a00-0000-b602-111e4f0a0000 pid=2639 execve guuid=17cd39d5-1a00-0000-b602-111e5d0a0000 pid=2653 /usr/bin/chmod guuid=d65646c2-1a00-0000-b602-111e1f0a0000 pid=2591->guuid=17cd39d5-1a00-0000-b602-111e5d0a0000 pid=2653 execve guuid=451787d5-1a00-0000-b602-111e5f0a0000 pid=2655 /usr/bin/dash guuid=d65646c2-1a00-0000-b602-111e1f0a0000 pid=2591->guuid=451787d5-1a00-0000-b602-111e5f0a0000 pid=2655 clone guuid=1d2e19d6-1a00-0000-b602-111e630a0000 pid=2659 /usr/bin/busybox net send-data write-file guuid=d65646c2-1a00-0000-b602-111e1f0a0000 pid=2591->guuid=1d2e19d6-1a00-0000-b602-111e630a0000 pid=2659 execve guuid=81a22cdc-1a00-0000-b602-111e750a0000 pid=2677 /usr/bin/chmod guuid=d65646c2-1a00-0000-b602-111e1f0a0000 pid=2591->guuid=81a22cdc-1a00-0000-b602-111e750a0000 pid=2677 execve guuid=1090bddc-1a00-0000-b602-111e780a0000 pid=2680 /usr/bin/dash guuid=d65646c2-1a00-0000-b602-111e1f0a0000 pid=2591->guuid=1090bddc-1a00-0000-b602-111e780a0000 pid=2680 clone guuid=f79a4add-1a00-0000-b602-111e7b0a0000 pid=2683 /usr/bin/busybox net send-data write-file guuid=d65646c2-1a00-0000-b602-111e1f0a0000 pid=2591->guuid=f79a4add-1a00-0000-b602-111e7b0a0000 pid=2683 execve guuid=0bd974e3-1a00-0000-b602-111e8d0a0000 pid=2701 /usr/bin/chmod guuid=d65646c2-1a00-0000-b602-111e1f0a0000 pid=2591->guuid=0bd974e3-1a00-0000-b602-111e8d0a0000 pid=2701 execve guuid=002ab9e3-1a00-0000-b602-111e8f0a0000 pid=2703 /usr/bin/dash guuid=d65646c2-1a00-0000-b602-111e1f0a0000 pid=2591->guuid=002ab9e3-1a00-0000-b602-111e8f0a0000 pid=2703 clone guuid=568a60e4-1a00-0000-b602-111e930a0000 pid=2707 /usr/bin/busybox net send-data write-file guuid=d65646c2-1a00-0000-b602-111e1f0a0000 pid=2591->guuid=568a60e4-1a00-0000-b602-111e930a0000 pid=2707 execve guuid=65a005e9-1a00-0000-b602-111ea10a0000 pid=2721 /usr/bin/chmod guuid=d65646c2-1a00-0000-b602-111e1f0a0000 pid=2591->guuid=65a005e9-1a00-0000-b602-111ea10a0000 pid=2721 execve guuid=02be4fe9-1a00-0000-b602-111ea30a0000 pid=2723 /usr/bin/dash guuid=d65646c2-1a00-0000-b602-111e1f0a0000 pid=2591->guuid=02be4fe9-1a00-0000-b602-111ea30a0000 pid=2723 clone guuid=eee7dee9-1a00-0000-b602-111ea60a0000 pid=2726 /usr/bin/busybox net send-data write-file guuid=d65646c2-1a00-0000-b602-111e1f0a0000 pid=2591->guuid=eee7dee9-1a00-0000-b602-111ea60a0000 pid=2726 execve guuid=603c5bf1-1a00-0000-b602-111ebc0a0000 pid=2748 /usr/bin/chmod guuid=d65646c2-1a00-0000-b602-111e1f0a0000 pid=2591->guuid=603c5bf1-1a00-0000-b602-111ebc0a0000 pid=2748 execve guuid=90c999f1-1a00-0000-b602-111ebd0a0000 pid=2749 /usr/bin/dash guuid=d65646c2-1a00-0000-b602-111e1f0a0000 pid=2591->guuid=90c999f1-1a00-0000-b602-111ebd0a0000 pid=2749 clone guuid=8b0648f2-1a00-0000-b602-111ec10a0000 pid=2753 /usr/bin/busybox net send-data write-file guuid=d65646c2-1a00-0000-b602-111e1f0a0000 pid=2591->guuid=8b0648f2-1a00-0000-b602-111ec10a0000 pid=2753 execve guuid=39d66cf8-1a00-0000-b602-111ed00a0000 pid=2768 /usr/bin/chmod guuid=d65646c2-1a00-0000-b602-111e1f0a0000 pid=2591->guuid=39d66cf8-1a00-0000-b602-111ed00a0000 pid=2768 execve guuid=d12ab1f8-1a00-0000-b602-111ed10a0000 pid=2769 /usr/bin/dash guuid=d65646c2-1a00-0000-b602-111e1f0a0000 pid=2591->guuid=d12ab1f8-1a00-0000-b602-111ed10a0000 pid=2769 clone guuid=902110fa-1a00-0000-b602-111ed70a0000 pid=2775 /usr/bin/busybox net send-data write-file guuid=d65646c2-1a00-0000-b602-111e1f0a0000 pid=2591->guuid=902110fa-1a00-0000-b602-111ed70a0000 pid=2775 execve guuid=e332f6ff-1a00-0000-b602-111ee20a0000 pid=2786 /usr/bin/chmod guuid=d65646c2-1a00-0000-b602-111e1f0a0000 pid=2591->guuid=e332f6ff-1a00-0000-b602-111ee20a0000 pid=2786 execve guuid=3fb23e00-1b00-0000-b602-111ee40a0000 pid=2788 /usr/bin/dash guuid=d65646c2-1a00-0000-b602-111e1f0a0000 pid=2591->guuid=3fb23e00-1b00-0000-b602-111ee40a0000 pid=2788 clone guuid=0131b900-1b00-0000-b602-111ee70a0000 pid=2791 /usr/bin/busybox net send-data write-file guuid=d65646c2-1a00-0000-b602-111e1f0a0000 pid=2591->guuid=0131b900-1b00-0000-b602-111ee70a0000 pid=2791 execve guuid=4c77d706-1b00-0000-b602-111eed0a0000 pid=2797 /usr/bin/chmod guuid=d65646c2-1a00-0000-b602-111e1f0a0000 pid=2591->guuid=4c77d706-1b00-0000-b602-111eed0a0000 pid=2797 execve guuid=31e02007-1b00-0000-b602-111eee0a0000 pid=2798 /usr/bin/dash guuid=d65646c2-1a00-0000-b602-111e1f0a0000 pid=2591->guuid=31e02007-1b00-0000-b602-111eee0a0000 pid=2798 clone guuid=fe6bec07-1b00-0000-b602-111ef10a0000 pid=2801 /usr/bin/busybox net send-data write-file guuid=d65646c2-1a00-0000-b602-111e1f0a0000 pid=2591->guuid=fe6bec07-1b00-0000-b602-111ef10a0000 pid=2801 execve guuid=f330b50c-1b00-0000-b602-111ef80a0000 pid=2808 /usr/bin/chmod guuid=d65646c2-1a00-0000-b602-111e1f0a0000 pid=2591->guuid=f330b50c-1b00-0000-b602-111ef80a0000 pid=2808 execve guuid=7d5a160d-1b00-0000-b602-111efb0a0000 pid=2811 /home/sandbox/x86 net guuid=d65646c2-1a00-0000-b602-111e1f0a0000 pid=2591->guuid=7d5a160d-1b00-0000-b602-111efb0a0000 pid=2811 execve guuid=89bbd41d-1b00-0000-b602-111e1c0b0000 pid=2844 /usr/bin/busybox net send-data write-file guuid=d65646c2-1a00-0000-b602-111e1f0a0000 pid=2591->guuid=89bbd41d-1b00-0000-b602-111e1c0b0000 pid=2844 execve guuid=31e7a725-1b00-0000-b602-111e2c0b0000 pid=2860 /usr/bin/chmod guuid=d65646c2-1a00-0000-b602-111e1f0a0000 pid=2591->guuid=31e7a725-1b00-0000-b602-111e2c0b0000 pid=2860 execve guuid=09340826-1b00-0000-b602-111e2e0b0000 pid=2862 /usr/bin/dash guuid=d65646c2-1a00-0000-b602-111e1f0a0000 pid=2591->guuid=09340826-1b00-0000-b602-111e2e0b0000 pid=2862 clone guuid=a752b827-1b00-0000-b602-111e300b0000 pid=2864 /usr/bin/rm delete-file guuid=d65646c2-1a00-0000-b602-111e1f0a0000 pid=2591->guuid=a752b827-1b00-0000-b602-111e300b0000 pid=2864 execve 9026545a-c041-53c3-ac12-3fe8657bbe73 149.102.155.8:80 guuid=90e19dc2-1a00-0000-b602-111e210a0000 pid=2593->9026545a-c041-53c3-ac12-3fe8657bbe73 send: 88B guuid=712ab9c9-1a00-0000-b602-111e3a0a0000 pid=2618->9026545a-c041-53c3-ac12-3fe8657bbe73 send: 89B guuid=2caf6ad0-1a00-0000-b602-111e4f0a0000 pid=2639->9026545a-c041-53c3-ac12-3fe8657bbe73 send: 89B guuid=1d2e19d6-1a00-0000-b602-111e630a0000 pid=2659->9026545a-c041-53c3-ac12-3fe8657bbe73 send: 89B guuid=f79a4add-1a00-0000-b602-111e7b0a0000 pid=2683->9026545a-c041-53c3-ac12-3fe8657bbe73 send: 89B guuid=568a60e4-1a00-0000-b602-111e930a0000 pid=2707->9026545a-c041-53c3-ac12-3fe8657bbe73 send: 89B guuid=eee7dee9-1a00-0000-b602-111ea60a0000 pid=2726->9026545a-c041-53c3-ac12-3fe8657bbe73 send: 89B guuid=8b0648f2-1a00-0000-b602-111ec10a0000 pid=2753->9026545a-c041-53c3-ac12-3fe8657bbe73 send: 88B guuid=902110fa-1a00-0000-b602-111ed70a0000 pid=2775->9026545a-c041-53c3-ac12-3fe8657bbe73 send: 88B guuid=0131b900-1b00-0000-b602-111ee70a0000 pid=2791->9026545a-c041-53c3-ac12-3fe8657bbe73 send: 88B guuid=fe6bec07-1b00-0000-b602-111ef10a0000 pid=2801->9026545a-c041-53c3-ac12-3fe8657bbe73 send: 88B 8b0a01dc-0728-52c1-8024-c4ba7801b8d6 8.8.8.8:53 guuid=7d5a160d-1b00-0000-b602-111efb0a0000 pid=2811->8b0a01dc-0728-52c1-8024-c4ba7801b8d6 con guuid=e992c41d-1b00-0000-b602-111e1a0b0000 pid=2842 /home/sandbox/x86 guuid=7d5a160d-1b00-0000-b602-111efb0a0000 pid=2811->guuid=e992c41d-1b00-0000-b602-111e1a0b0000 pid=2842 clone guuid=1ac8c81d-1b00-0000-b602-111e1b0b0000 pid=2843 /home/sandbox/x86 net send-data zombie guuid=7d5a160d-1b00-0000-b602-111efb0a0000 pid=2811->guuid=1ac8c81d-1b00-0000-b602-111e1b0b0000 pid=2843 clone guuid=1ac8c81d-1b00-0000-b602-111e1b0b0000 pid=2843->8b0a01dc-0728-52c1-8024-c4ba7801b8d6 con dfbb6132-9b3a-5fcc-ae73-0a5bea22ee6b 87.121.84.220:61459 guuid=1ac8c81d-1b00-0000-b602-111e1b0b0000 pid=2843->dfbb6132-9b3a-5fcc-ae73-0a5bea22ee6b send: 43B guuid=89bbd41d-1b00-0000-b602-111e1c0b0000 pid=2844->9026545a-c041-53c3-ac12-3fe8657bbe73 send: 91B
Threat name:
Linux.Trojan.Alevaul
Status:
Malicious
First seen:
2025-08-23 06:15:57 UTC
File Type:
Text (Shell)
AV detection:
18 of 38 (47.37%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Modifies registry class
Suspicious use of SetWindowsHookEx
Enumerates physical storage devices
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh bf2a44b6c4e5d851d5dacd0d0d34e98bd3051eed36c02f638df15aa96f74df78

(this sample)

  
Delivery method
Distributed via web download

Comments