MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 c1d2fa8cfd763650ce5f13ca2e8018f48d3bbb0971370901cc43e75d303a6040. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: c1d2fa8cfd763650ce5f13ca2e8018f48d3bbb0971370901cc43e75d303a6040
SHA3-384 hash: 386c82c09fae6a065b92f6e90631284115f43709a3a23d858cb87eba53d0a5b1975c918462ec276887cb5f4d4e33d7ed
SHA1 hash: d8487b6b0cb1cc728019ecc8e2cb1dbc6f60cacb
MD5 hash: ca8694faf3e568bdf96a522888f580fa
humanhash: mexico-artist-florida-carbon
File name:r.sh
Download: download sample
Signature Mirai
File size:246 bytes
First seen:2025-08-28 07:33:11 UTC
Last seen:Never
File type: sh
MIME type:text/plain
ssdeep 6:LMFi6c56FX4fGexJVMFi6c54FI33fGexJVMFi6c5a3fGe8:oi6cU54fJxJKi6cCI33fJxJKi6cQ3fJ8
TLSH T134D012CC0040D8358C55C4053923CC64D55EE0A039300A583AC91134999C665E055DD9
Magika shell
Reporter abuse_ch
Tags:sh
URLMalware sample (SHA256 hash)SignatureTags
http://185.121.13.159/lol.arm5d42c76a9dd05e0e00561b9dec3aa16042cafd56cce474322d2e9ae8cf3cb63b3 Miraielf mirai ua-wget
http://185.121.13.159/lol.arm7e3e3ae079060ff2a17c1f535550e1004d6d505190947ed09e887eb3f6e578713 Miraielf mirai ua-wget
http://185.121.13.159/lol.arma4b34e8d9988291486b2d4e74dd2236153e9c5330cbd07406a815201709ddc98 Miraielf mirai ua-wget

Intelligence


File Origin
# of uploads :
1
# of downloads :
34
Origin country :
DE DE
Vendor Threat Intelligence
Verdict:
Malicious
File Type:
text
First seen:
2025-08-28T05:17:00Z UTC
Last seen:
2025-08-28T05:17:00Z UTC
Hits:
~10
Status:
terminated
Behavior Graph:
%3 guuid=7bdba610-1a00-0000-2056-a72ae1090000 pid=2529 /usr/bin/sudo guuid=571f3812-1a00-0000-2056-a72ae5090000 pid=2533 /tmp/sample.bin guuid=7bdba610-1a00-0000-2056-a72ae1090000 pid=2529->guuid=571f3812-1a00-0000-2056-a72ae5090000 pid=2533 execve guuid=8fb57e12-1a00-0000-2056-a72ae7090000 pid=2535 /usr/bin/wget net send-data write-file guuid=571f3812-1a00-0000-2056-a72ae5090000 pid=2533->guuid=8fb57e12-1a00-0000-2056-a72ae7090000 pid=2535 execve guuid=e2b75c19-1a00-0000-2056-a72af2090000 pid=2546 /usr/bin/chmod guuid=571f3812-1a00-0000-2056-a72ae5090000 pid=2533->guuid=e2b75c19-1a00-0000-2056-a72af2090000 pid=2546 execve guuid=d5b5a419-1a00-0000-2056-a72af3090000 pid=2547 /usr/bin/dash guuid=571f3812-1a00-0000-2056-a72ae5090000 pid=2533->guuid=d5b5a419-1a00-0000-2056-a72af3090000 pid=2547 clone guuid=f2e6421a-1a00-0000-2056-a72af7090000 pid=2551 /usr/bin/wget net send-data write-file guuid=571f3812-1a00-0000-2056-a72ae5090000 pid=2533->guuid=f2e6421a-1a00-0000-2056-a72af7090000 pid=2551 execve guuid=59c36d2a-1a00-0000-2056-a72a200a0000 pid=2592 /usr/bin/chmod guuid=571f3812-1a00-0000-2056-a72ae5090000 pid=2533->guuid=59c36d2a-1a00-0000-2056-a72a200a0000 pid=2592 execve guuid=0c78bc2a-1a00-0000-2056-a72a220a0000 pid=2594 /usr/bin/dash guuid=571f3812-1a00-0000-2056-a72ae5090000 pid=2533->guuid=0c78bc2a-1a00-0000-2056-a72a220a0000 pid=2594 clone guuid=9499772b-1a00-0000-2056-a72a260a0000 pid=2598 /usr/bin/wget net send-data write-file guuid=571f3812-1a00-0000-2056-a72ae5090000 pid=2533->guuid=9499772b-1a00-0000-2056-a72a260a0000 pid=2598 execve guuid=fc20c135-1a00-0000-2056-a72a3d0a0000 pid=2621 /usr/bin/chmod guuid=571f3812-1a00-0000-2056-a72ae5090000 pid=2533->guuid=fc20c135-1a00-0000-2056-a72a3d0a0000 pid=2621 execve guuid=db662536-1a00-0000-2056-a72a3f0a0000 pid=2623 /usr/bin/dash guuid=571f3812-1a00-0000-2056-a72ae5090000 pid=2533->guuid=db662536-1a00-0000-2056-a72a3f0a0000 pid=2623 clone 46c5cf3c-ed7d-558b-b835-3a135f52a779 185.121.13.159:80 guuid=8fb57e12-1a00-0000-2056-a72ae7090000 pid=2535->46c5cf3c-ed7d-558b-b835-3a135f52a779 send: 137B guuid=f2e6421a-1a00-0000-2056-a72af7090000 pid=2551->46c5cf3c-ed7d-558b-b835-3a135f52a779 send: 137B guuid=9499772b-1a00-0000-2056-a72a260a0000 pid=2598->46c5cf3c-ed7d-558b-b835-3a135f52a779 send: 136B
Verdict:
Malicious
Threat:
Trojan-Downloader.Shell.Agent
Threat name:
Script.Trojan.Multiverze
Status:
Malicious
First seen:
2025-08-28 07:28:09 UTC
File Type:
Text (Shell)
AV detection:
9 of 38 (23.68%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Modifies registry class
Suspicious use of SetWindowsHookEx
Enumerates physical storage devices
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh c1d2fa8cfd763650ce5f13ca2e8018f48d3bbb0971370901cc43e75d303a6040

(this sample)

  
Delivery method
Distributed via web download

Comments