MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 bf84b95a3561ffa3dd65a94b28891a12aed0fecfcf79b9bcaea58a1cfb9dbd60. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 7


Intelligence 7 IOCs YARA 1 File information Comments

SHA256 hash: bf84b95a3561ffa3dd65a94b28891a12aed0fecfcf79b9bcaea58a1cfb9dbd60
SHA3-384 hash: f73d1774be1eb51954a2f7d38437ac17b0418aa8bf443f4a96d33902b00054471f8f1e087b3901d0acca81b7def6d23a
SHA1 hash: 3ab426487a60da400a446e507129b3dac6d5d58d
MD5 hash: b991f5c25f2cbc8d2ff12333a643be28
humanhash: spaghetti-whiskey-yankee-chicken
File name:linnn
Download: download sample
Signature Mirai
File size:624 bytes
First seen:2025-06-23 10:56:51 UTC
Last seen:2025-06-25 08:40:03 UTC
File type: sh
MIME type:text/plain
ssdeep 12:3WKDbnPZ95ZMoOF7+MB05L73Nvx73NMDNkG73WyTx73WygDNks:GIbr5zOt+MB0hZpZmkG1iks
TLSH T1B4F07DCE52A1CC719C920CEA7296491DF8CED4C916CB8EC8A1CD003AE49CD043152F69
Magika shell
Reporter abuse_ch
Tags:sh
URLMalware sample (SHA256 hash)SignatureTags
http://158.51.126.131/armv5l506a3e39a46d0e6d13ba89dd5a6fe2aa81c5122db15742d4ce509a3c0738ff01 Miraielf gafgyt mirai ua-wget
http://158.51.126.131/armv7l69c12ce6f569adfaa217f1ebd365b727e3d2f882f22ef10169c8dc7ad3a05f4e Miraielf gafgyt mirai ua-wget

Intelligence


File Origin
# of uploads :
7
# of downloads :
67
Origin country :
DE DE
Vendor Threat Intelligence
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
busybox
Status:
terminated
Behavior Graph:
%3 guuid=d912f82b-1a00-0000-3820-a698260a0000 pid=2598 /usr/bin/sudo guuid=6070b32d-1a00-0000-3820-a6982d0a0000 pid=2605 /tmp/sample.bin guuid=d912f82b-1a00-0000-3820-a698260a0000 pid=2598->guuid=6070b32d-1a00-0000-3820-a6982d0a0000 pid=2605 execve guuid=262d0d2e-1a00-0000-3820-a6982f0a0000 pid=2607 /usr/bin/dash guuid=6070b32d-1a00-0000-3820-a6982d0a0000 pid=2605->guuid=262d0d2e-1a00-0000-3820-a6982f0a0000 pid=2607 clone guuid=2ebc1d2f-1a00-0000-3820-a698380a0000 pid=2616 /usr/bin/rm delete-file guuid=6070b32d-1a00-0000-3820-a6982d0a0000 pid=2605->guuid=2ebc1d2f-1a00-0000-3820-a698380a0000 pid=2616 execve guuid=f7d97c2f-1a00-0000-3820-a6983a0a0000 pid=2618 /usr/bin/rm delete-file guuid=6070b32d-1a00-0000-3820-a6982d0a0000 pid=2605->guuid=f7d97c2f-1a00-0000-3820-a6983a0a0000 pid=2618 execve guuid=092bd22f-1a00-0000-3820-a6983c0a0000 pid=2620 /usr/bin/rm delete-file guuid=6070b32d-1a00-0000-3820-a6982d0a0000 pid=2605->guuid=092bd22f-1a00-0000-3820-a6983c0a0000 pid=2620 execve guuid=42062830-1a00-0000-3820-a6983e0a0000 pid=2622 /usr/bin/dash guuid=6070b32d-1a00-0000-3820-a6982d0a0000 pid=2605->guuid=42062830-1a00-0000-3820-a6983e0a0000 pid=2622 clone guuid=0b0da330-1a00-0000-3820-a698420a0000 pid=2626 /usr/bin/dash guuid=6070b32d-1a00-0000-3820-a6982d0a0000 pid=2605->guuid=0b0da330-1a00-0000-3820-a698420a0000 pid=2626 clone guuid=595bee30-1a00-0000-3820-a698450a0000 pid=2629 /usr/bin/dash guuid=6070b32d-1a00-0000-3820-a6982d0a0000 pid=2605->guuid=595bee30-1a00-0000-3820-a698450a0000 pid=2629 clone guuid=3185435c-1a00-0000-3820-a698c60a0000 pid=2758 /usr/bin/chmod guuid=6070b32d-1a00-0000-3820-a6982d0a0000 pid=2605->guuid=3185435c-1a00-0000-3820-a698c60a0000 pid=2758 execve guuid=15b2975c-1a00-0000-3820-a698c80a0000 pid=2760 /usr/bin/dash guuid=6070b32d-1a00-0000-3820-a6982d0a0000 pid=2605->guuid=15b2975c-1a00-0000-3820-a698c80a0000 pid=2760 clone guuid=004e325d-1a00-0000-3820-a698cc0a0000 pid=2764 /usr/bin/dash guuid=6070b32d-1a00-0000-3820-a6982d0a0000 pid=2605->guuid=004e325d-1a00-0000-3820-a698cc0a0000 pid=2764 clone guuid=362fee87-1a00-0000-3820-a698110b0000 pid=2833 /usr/bin/chmod guuid=6070b32d-1a00-0000-3820-a6982d0a0000 pid=2605->guuid=362fee87-1a00-0000-3820-a698110b0000 pid=2833 execve guuid=4ee65388-1a00-0000-3820-a698130b0000 pid=2835 /usr/bin/dash guuid=6070b32d-1a00-0000-3820-a6982d0a0000 pid=2605->guuid=4ee65388-1a00-0000-3820-a698130b0000 pid=2835 clone guuid=f3b3172e-1a00-0000-3820-a698300a0000 pid=2608 /usr/bin/cat guuid=262d0d2e-1a00-0000-3820-a6982f0a0000 pid=2607->guuid=f3b3172e-1a00-0000-3820-a698300a0000 pid=2608 execve guuid=6c431f2e-1a00-0000-3820-a698310a0000 pid=2609 /usr/bin/grep guuid=262d0d2e-1a00-0000-3820-a6982f0a0000 pid=2607->guuid=6c431f2e-1a00-0000-3820-a698310a0000 pid=2609 execve guuid=45bb262e-1a00-0000-3820-a698320a0000 pid=2610 /usr/bin/grep guuid=262d0d2e-1a00-0000-3820-a6982f0a0000 pid=2607->guuid=45bb262e-1a00-0000-3820-a698320a0000 pid=2610 execve guuid=b4982d2e-1a00-0000-3820-a698330a0000 pid=2611 /usr/bin/grep guuid=262d0d2e-1a00-0000-3820-a6982f0a0000 pid=2607->guuid=b4982d2e-1a00-0000-3820-a698330a0000 pid=2611 execve guuid=cd9f372e-1a00-0000-3820-a698340a0000 pid=2612 /usr/bin/cut guuid=262d0d2e-1a00-0000-3820-a6982f0a0000 pid=2607->guuid=cd9f372e-1a00-0000-3820-a698340a0000 pid=2612 execve guuid=4ed02e30-1a00-0000-3820-a6983f0a0000 pid=2623 /usr/bin/cp write-file guuid=42062830-1a00-0000-3820-a6983e0a0000 pid=2622->guuid=4ed02e30-1a00-0000-3820-a6983f0a0000 pid=2623 execve guuid=c12fac30-1a00-0000-3820-a698430a0000 pid=2627 /usr/bin/chmod guuid=0b0da330-1a00-0000-3820-a698420a0000 pid=2626->guuid=c12fac30-1a00-0000-3820-a698430a0000 pid=2627 execve guuid=d81ef930-1a00-0000-3820-a698460a0000 pid=2630 /usr/bin/wget net send-data write-file guuid=595bee30-1a00-0000-3820-a698450a0000 pid=2629->guuid=d81ef930-1a00-0000-3820-a698460a0000 pid=2630 execve 2beca644-24da-5e18-bc49-c06b8c4a111d 158.51.126.131:80 guuid=d81ef930-1a00-0000-3820-a698460a0000 pid=2630->2beca644-24da-5e18-bc49-c06b8c4a111d send: 135B guuid=ff843b5d-1a00-0000-3820-a698cd0a0000 pid=2765 /usr/bin/wget net send-data write-file guuid=004e325d-1a00-0000-3820-a698cc0a0000 pid=2764->guuid=ff843b5d-1a00-0000-3820-a698cd0a0000 pid=2765 execve guuid=ff843b5d-1a00-0000-3820-a698cd0a0000 pid=2765->2beca644-24da-5e18-bc49-c06b8c4a111d send: 135B
Threat name:
Script.Trojan.Multiverze
Status:
Malicious
First seen:
2025-06-23 11:00:56 UTC
File Type:
Text (Shell)
AV detection:
9 of 24 (37.50%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Modifies registry class
Suspicious use of SetWindowsHookEx
Enumerates physical storage devices
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:ach_202412_suspect_bash_script
Author:abuse.ch
Description:Detects suspicious Linux bash scripts

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh bf84b95a3561ffa3dd65a94b28891a12aed0fecfcf79b9bcaea58a1cfb9dbd60

(this sample)

  
Delivery method
Distributed via web download

Comments