MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 c746cf006d3f6b9a5fdaf6923574fa9dac9031ad72041234cdf6f124c5fcef76. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 8


Intelligence 8 IOCs YARA 1 File information Comments

SHA256 hash: c746cf006d3f6b9a5fdaf6923574fa9dac9031ad72041234cdf6f124c5fcef76
SHA3-384 hash: 48a504bac2ad597ddd118f6bb520bb9b56cf2f80d168447c8403722df3152e85a2d9b4e25d765b69939f9e7d1f23ab05
SHA1 hash: e9b714649d784aa32ce23a539f156046fd0b0718
MD5 hash: b1d60de76ab6d16e6a7390fb748b18bf
humanhash: victor-sink-virginia-foxtrot
File name:ohshit.sh
Download: download sample
Signature Mirai
File size:3'000 bytes
First seen:2025-05-20 14:59:38 UTC
Last seen:Never
File type: sh
MIME type:text/x-shellscript
ssdeep 48:v+X7PX7N7h+XQX6G+Xg4XzP+XAXKW+XKXoU+X7KX7o7U+XflX3b+XfX9R+XGXcgR:v+X7PX7N7h+XQX6G+Xg4XzP+XAXKW+X8
TLSH T13451D9E5415A8C3C3C636E53E6BE412834A39A7318FAAF95DBC4BAE0874ED343540B53
Magika shell
Reporter abuse_ch
Tags:mirai sh
URLMalware sample (SHA256 hash)SignatureTags
http://213.209.150.107/hiddenbin/boatnet.x86e8a9ec11dde5e3af13b62bc826514cde87a6ffbf9d7c1275d377defd529f685c Miraielf mirai
http://213.209.150.107/hiddenbin/boatnet.mipsc9bce2aa7425750fcf3ed691635f1aa9a4eeb1a41137e9ce6285768d28a6a8ef Miraielf mirai
http://213.209.150.107/hiddenbin/boatnet.arcf611d639625fdfb11bc469efe32a355f08c0a124535cb1c1aacf62bdf6b6ac3e Miraielf mirai ua-wget
http://213.209.150.107/hiddenbin/boatnet.i468n/an/aelf ua-wget
http://213.209.150.107/hiddenbin/boatnet.i686n/an/aelf ua-wget
http://213.209.150.107/hiddenbin/boatnet.x86_64n/an/aelf ua-wget
http://213.209.150.107/hiddenbin/boatnet.mpsl7e0d8be0783e68cea0fd1495ef8a2c0fb6704ccb469b1e5d3a0d249229334bd3 Miraielf mirai
http://213.209.150.107/hiddenbin/boatnet.arm7ea46f7eb321860344feebf16ebc57535777e56df0afbe2b9c91f0b1704b6f48 Miraielf mirai
http://213.209.150.107/hiddenbin/boatnet.arm5041c71ef70c7bab566b6482f6f1eddfc5d18be2c5839f4cf8680c158164a7183 Miraielf mirai
http://213.209.150.107/hiddenbin/boatnet.arm61112d1e433a2b844d31ec9aefdb8b22419b8269bce3dfc08ec8f14390d6aa82c Miraielf mirai
http://213.209.150.107/hiddenbin/boatnet.arm78c0eab1cc6b8c573f58e7df728f221ebb537a011e93423b1b5493080c4f836db Miraielf mirai
http://213.209.150.107/hiddenbin/boatnet.ppc67c20358b45a2c644e807254259fdb695c6c3b93fe2791d8693e66988d48f116 Miraielf mirai
http://213.209.150.107/hiddenbin/boatnet.spce62b447ef1276a909f5c8bb5dc784498f81bc620837af80704c01af464bed18a Miraielf mirai ua-wget
http://213.209.150.107/hiddenbin/boatnet.m68kf869a2ea81e3859769a4c3e56a56c5b8d9d4b3f8eb5fcd52bf4937d40f208126 Miraielf mirai
http://213.209.150.107/hiddenbin/boatnet.sh40d7cec7cf889cf4a38f437c481f43d64e76125833f32d1ef454c013716499b36 Miraielf mirai

Intelligence


File Origin
# of uploads :
1
# of downloads :
66
Origin country :
DE DE
Vendor Threat Intelligence
Threat name:
Linux.Downloader.Medusa
Status:
Malicious
First seen:
2025-05-20 15:00:43 UTC
File Type:
Text (Shell)
AV detection:
24 of 37 (64.86%)
Threat level:
  3/5
Result
Malware family:
Score:
  10/10
Tags:
family:mirai botnet:lzrd antivm botnet defense_evasion discovery linux upx
Behaviour
System Network Configuration Discovery
Writes file to tmp directory
Reads runtime system information
Checks CPU configuration
UPX packed file
Enumerates running processes
Writes file to system bin folder
File and Directory Permissions Modification
Executes dropped EXE
Modifies Watchdog functionality
Mirai
Mirai family
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Linux_Shellscript_Downloader
Author:albertzsigovits
Description:Generic Approach to Shellscript downloaders

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh c746cf006d3f6b9a5fdaf6923574fa9dac9031ad72041234cdf6f124c5fcef76

(this sample)

  
Delivery method
Distributed via web download

Comments