MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 c07c0eef2f2ac6cb187918e6ec8158262e7beab8a79e418fce6389a9f89b451f. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 7


Intelligence 7 IOCs YARA 2 File information Comments

SHA256 hash: c07c0eef2f2ac6cb187918e6ec8158262e7beab8a79e418fce6389a9f89b451f
SHA3-384 hash: 993d6386493413a1e39f7629ee14295925e516b24da9371c2383f4622e7978b049532bf0ce1efd78ec201effabc1aa63
SHA1 hash: 8b31087fe1ec91bce451a9a0d860a08c9b102ebf
MD5 hash: ae9e457c077f9be7bf1367a6dfc3878a
humanhash: golf-mirror-virginia-purple
File name:nigger.sh
Download: download sample
Signature Mirai
File size:2'039 bytes
First seen:2026-01-10 08:38:42 UTC
Last seen:Never
File type: sh
MIME type:text/plain
ssdeep 48:AVThJWdVjNJcC9cJrOz9myrNjAiGOWy48Tk78GQn2:AVTh0VjNrcJqzE0NjAu743vQ2
TLSH T17E41B6CF063E39114EC7CF2B73E106CA5185A2E1E097CFF4A80C192668C58C875DDEA9
Magika shell
Reporter abuse_ch
Tags:sh
URLMalware sample (SHA256 hash)SignatureTags
http://91.92.241.10/x86_64.kok47e1b67862e668c9398b010a3b0d49dfce4162795b5db6219318cef9ba5fcc60 Miraielf geofenced mirai ua-wget USA x86
http://91.92.241.10/x86_32.kok03d7a243a18f053113e199837d74324b063c744679e681dde068d129d109af9f Miraielf geofenced mirai ua-wget USA x86
http://91.92.241.10/nigga44d1b3689ea3188249b2d008020bec2dc2c5d82d25eeff708c1d776e0801ecf6 Miraielf geofenced mirai ua-wget USA x86
http://91.92.241.10/x86_64.kokz78e260a5118578e0b4d1a55374c217c218c48ab8f7455dd5a28a70746f99f715 Miraielf geofenced mirai ua-wget USA x86
http://91.92.241.10/x86_32.kokz03d7a243a18f053113e199837d74324b063c744679e681dde068d129d109af9f Miraielf geofenced mirai ua-wget USA x86
http://91.92.241.10/powerpc.kok7570d065c824764a1a3a6c65496685bfc83eff811cc1345ccb7273141950cb46 Miraielf geofenced mirai PowerPC ua-wget USA
http://91.92.241.10/mips.kokdf84c58145c759e99c74fed1570dbf9089dfb200669fb911f4d60f307ef63648 Miraielf geofenced mips mirai ua-wget USA
http://91.92.241.10/mipsel.kokd8409d9322d329c981e3ebaa0f02336bcfd122f93210ad1aa627a125196d5a57 Miraielf geofenced mips mirai ua-wget USA
http://91.92.241.10/arm.kokf762c3e51a32e4e93fd41fe3be4eac71606d84cc1372f5e100bff5b35241e74f Miraiarm elf geofenced mirai ua-wget USA
http://91.92.241.10/arm5.kokff4abf773e3047ea1a94dbb4d2a7032a9dccc7a396cad04511d991c66dc37448 Miraiarm elf geofenced mirai ua-wget USA
http://91.92.241.10/arm6.kok6ae6ed76ac1b59475676b279f542a724967a0a91c61aa76cb9e2d307b1e26fa7 Miraiarm elf geofenced mirai ua-wget USA
http://91.92.241.10/arm7.kok4db331198b2aadcb90aadfbb9f68c033e08eea1eacb3020cd45eaa407bc4c1dc Miraiarm elf geofenced mirai ua-wget USA
http://91.92.241.10/sparc.kokn/an/aelf ua-wget
http://91.92.241.10/m68k.kokn/an/aelf ua-wget
http://91.92.241.10/sh4.kokn/an/aelf ua-wget

Intelligence


File Origin
# of uploads :
1
# of downloads :
44
Origin country :
DE DE
Vendor Threat Intelligence
No detections
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
evasive mirai
Verdict:
Malicious
File Type:
text
First seen:
2026-01-10T05:53:00Z UTC
Last seen:
2026-01-11T05:42:00Z UTC
Hits:
~10
Detections:
HEUR:Trojan-Downloader.Shell.Agent.a
Verdict:
Malicious
Threat:
Trojan-Downloader.Shell.Agent
Threat name:
Script-Shell.Worm.Mirai
Status:
Malicious
First seen:
2026-01-10 08:39:42 UTC
File Type:
Text (Shell)
AV detection:
8 of 24 (33.33%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Modifies registry class
Suspicious use of SetWindowsHookEx
Enumerates physical storage devices
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:ach_202412_suspect_bash_script
Author:abuse.ch
Description:Detects suspicious Linux bash scripts
Rule name:MAL_Linux_IoT_MultiArch_BotnetLoader_Generic
Author:Anish Bogati
Description:Technique-based detection of IoT/Linux botnet loader shell scripts downloading binaries from numeric IPs, chmodding, and executing multi-architecture payloads
Reference:MalwareBazaar sample lilin.sh

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh c07c0eef2f2ac6cb187918e6ec8158262e7beab8a79e418fce6389a9f89b451f

(this sample)

  
Delivery method
Distributed via web download

Comments